NikhilPanwar / secrets-ninjaLinks
Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.
☆157Updated 3 weeks ago
Alternatives and similar repositories for secrets-ninja
Users that are interested in secrets-ninja are comparing it to the libraries listed below
Sorting:
- FrogPost: postMessage Security Testing Tool☆104Updated 3 weeks ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆83Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated 3 months ago
- Burp Suite extension for testing Passkey systems.☆75Updated 8 months ago
- A collection of Turbo Intruder scripts.☆65Updated 10 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆385Updated 5 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆107Updated 6 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆86Updated 2 weeks ago
- Hijack a slack bot to phish your way in☆57Updated 5 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆56Updated 7 months ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆41Updated 6 months ago
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Updated last year
- A Powerful Network Reconnaissance Tool for Security Professionals☆106Updated 11 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated 10 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 8 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 10 months ago
- ☆192Updated 8 months ago
- A multifaceted security tool which leverages Public GitHub REST APIs for OSINT, Forensics, Pentesting and more.☆168Updated 2 weeks ago
- Protection against HTML smuggling attacks.☆100Updated 5 months ago
- Additional active scan checks for BURP☆28Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆102Updated 4 months ago
- Cloud subdomains identification tool☆62Updated 8 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 8 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆52Updated last week
- AI/LLM local model integration for analysis of reconftw results☆84Updated 7 months ago
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆68Updated 8 months ago
- Autonomous AI C2☆32Updated last year
- ☆185Updated last month
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 3 weeks ago