Plazmaz / leaky-repoLinks
Benchmarking repo for secrets scanning
☆231Updated 10 months ago
Alternatives and similar repositories for leaky-repo
Users that are interested in leaky-repo are comparing it to the libraries listed below
Sorting:
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆301Updated 2 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆152Updated 2 years ago
- Bass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers …☆147Updated last year
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆287Updated 5 months ago
- Automatic finder for subdomains vulnerable to takeover. Written in Go, based on @haccer's subjack.☆148Updated 4 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆219Updated 7 years ago
- secretz, minimizing the large attack surface of Travis CI☆326Updated 3 years ago
- Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will m…☆101Updated 5 years ago
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆219Updated 2 years ago
- Push notifications for passive DNS data☆109Updated 9 years ago
- Recursive DNS Subdomain Enumerator with dead-end avoidance system (BETA)☆145Updated 4 years ago
- rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments☆247Updated 5 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆137Updated 5 years ago
- List HackerOne private program assets☆152Updated 3 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆260Updated 3 years ago
- Burp Suite Extension to monitor new scope☆198Updated 4 years ago
- A tool to find sensitive keys and passwords in Travis logs☆142Updated 3 years ago
- A handy DNS service written in Go to aid in the detection of several types of blind vulnerabilities. It monitors a pentester's server for…☆191Updated 4 years ago
- A simple SSRF-testing sheriff written in Go☆327Updated 7 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- Weaponizing Live CT logs for automated monitoring of assets☆134Updated 3 years ago
- Pentest/BugBounty progress control with scanning modules☆281Updated 4 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- ☆275Updated 3 years ago
- SSRF testing tool☆244Updated 2 years ago
- Continuous monitoring for JavaScript files☆220Updated 5 years ago
- An hourly updated list of subdomains gathered from certificate transparency logs☆348Updated 3 years ago
- Bugbounty scope tool☆330Updated 3 months ago
- ☆244Updated 7 years ago
- Web app authorisation coverage scanning☆237Updated 2 years ago