BenjaminIheukumere / secrets_find0rView external linksLinks
Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates shares, recursively scans files with regex/keyword rules, highlights matched tokens on screen, and exports clean ASCII tables. Supports DOCX/PDF/legacy Office and depth limits.
☆67Oct 20, 2025Updated 3 months ago
Alternatives and similar repositories for secrets_find0r
Users that are interested in secrets_find0r are comparing it to the libraries listed below
Sorting:
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆24Jun 11, 2025Updated 8 months ago
- ☆12Feb 20, 2022Updated 3 years ago
- ☆16Jul 20, 2025Updated 6 months ago
- ☆18Sep 1, 2025Updated 5 months ago
- A PowerShell variant of the amazing patch_review.py by kevthehermit☆185Oct 23, 2025Updated 3 months ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆43Nov 22, 2025Updated 2 months ago
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspe…☆33Oct 24, 2025Updated 3 months ago
- Azure AppHunter is an open-source tool created for security researchers, red teamers and defenders to help them identify excessive privil…☆99Sep 10, 2025Updated 5 months ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆65Nov 14, 2025Updated 3 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Comunidade Brasileira de Cibersegurança☆22Oct 6, 2025Updated 4 months ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- ☆120May 29, 2025Updated 8 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Jun 12, 2024Updated last year
- ☆11Aug 31, 2019Updated 6 years ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆36Nov 5, 2024Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated 11 months ago
- Serverless AITM Simulation Framework for Entra ID and M365☆208Dec 29, 2025Updated last month
- Enterprise SOC Lab with automated threat detection, SOAR orchestration, and incident response☆28Jan 21, 2026Updated 3 weeks ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆23Jan 17, 2026Updated 3 weeks ago
- ☆22Nov 22, 2025Updated 2 months ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Join RHEL and Debian based systems to Active Directory☆11Apr 18, 2020Updated 5 years ago
- Detecting and Responding to Threats using Microsoft 365 Defender, published by Packt☆16Jul 10, 2023Updated 2 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- Postman collections for interacting with Cisco Stealthwatch Enterprise APIs☆10Apr 26, 2023Updated 2 years ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆106Mar 10, 2025Updated 11 months ago
- Generates Wireguard configuration files☆15Jul 26, 2022Updated 3 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- SyncToy, but brought up-to-date with a Fluent design and a nod to the past.☆12May 14, 2024Updated last year
- SlideDecks from Meetups☆12Jan 9, 2026Updated last month
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 8 months ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- ☆11Dec 17, 2024Updated last year