Lu3ky13 / Search-for-all-leaked-keys-secrets-using-one-regex-Links
Search for all leaked keys/secrets using one regex! bugbounty
☆139Updated 6 months ago
Alternatives and similar repositories for Search-for-all-leaked-keys-secrets-using-one-regex-
Users that are interested in Search-for-all-leaked-keys-secrets-using-one-regex- are comparing it to the libraries listed below
Sorting:
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆151Updated last week
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆226Updated 2 weeks ago
- ☆94Updated 6 months ago
- Super Weird XSS Payloads☆120Updated last week
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆176Updated last week
- Parse FFUF results in GUI with option to sort based by response code , size , keyword☆98Updated last year
- Advanced CORS Header Checker Tool with Vulnerability Detection and Bypass Attempts☆63Updated 3 months ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆138Updated 9 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆115Updated 11 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆123Updated 9 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆98Updated 3 months ago
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆105Updated last year
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆147Updated last month
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆101Updated 2 months ago
- A Powerful Recon Engine☆68Updated 10 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆239Updated this week
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆260Updated 2 months ago
- ☆46Updated 6 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆207Updated last month
- ☆145Updated 6 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆101Updated last month
- ☆124Updated last month
- ☆205Updated 8 months ago
- ☆75Updated 3 months ago
- Analyze Android native `.so` files☆81Updated 2 months ago
- A passive way to find backups/ sensitive information.☆88Updated 2 months ago
- Backup Files Wordlist Generator - generate a comprehensive list of potential backup file Wordlist based on a given list URL and backup fi…☆82Updated 3 months ago
- ☆69Updated 4 months ago
- ☆190Updated 5 months ago
- ☆172Updated last month