Search for all leaked keys/secrets using one regex! bugbounty
☆229Mar 29, 2025Updated last year
Alternatives and similar repositories for Search-for-all-leaked-keys-secrets-using-one-regex-
Users that are interested in Search-for-all-leaked-keys-secrets-using-one-regex- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆44Feb 24, 2025Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆133May 12, 2025Updated 11 months ago
- ☆102Apr 4, 2025Updated last year
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 2 months ago
- CrlfiX☆22Jan 30, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automated way to extract juicy info with subfinder and waybackurls☆41Aug 24, 2025Updated 7 months ago
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Jun 28, 2025Updated 9 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆104Apr 11, 2025Updated last year
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- Grep subdomains from web pages.☆42Feb 10, 2025Updated last year
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 5 months ago
- ♥☆191Sep 7, 2025Updated 7 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆230Aug 25, 2025Updated 7 months ago
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆46Mar 8, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆95Oct 5, 2025Updated 6 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆126Dec 17, 2024Updated last year
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆226Sep 25, 2025Updated 6 months ago
- ☆96Apr 3, 2025Updated last year
- A fast subdomain takeover tool☆86Mar 31, 2026Updated 2 weeks ago
- ☆23Mar 22, 2025Updated last year
- how to look for Leaked Credentials !☆1,042May 6, 2024Updated last year
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 5 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 9 months ago
- Exploits Unauth Docker API☆43Apr 18, 2025Updated last year
- ☆26Nov 24, 2025Updated 4 months ago
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆939Aug 24, 2023Updated 2 years ago
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆733Jul 10, 2024Updated last year
- ☆26Jan 23, 2025Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆92Aug 3, 2025Updated 8 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆15Mar 7, 2024Updated 2 years ago
- Complete Solution for VAPT/AppSec and Pentesting Guide: Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | …☆1,649Mar 1, 2026Updated last month
- ☆18Nov 2, 2024Updated last year
- Android Protection Bypass Stuff that I compiled from few resources.☆26Dec 10, 2022Updated 3 years ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆15Nov 20, 2025Updated 4 months ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆563Mar 8, 2025Updated last year
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,555Dec 7, 2025Updated 4 months ago