An advanced scanner for exposed secrets in web pages, APIs, and source code.
☆13Apr 22, 2025Updated last year
Alternatives and similar repositories for Profanatica-Secret-Scanner
Users that are interested in Profanatica-Secret-Scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CraftCMS RCE Checker (CVE-2025-32432)☆10Apr 27, 2025Updated last year
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- Kernel for Alioth devices based on Xiaomi SM8250 with Nethunter support☆18Feb 18, 2024Updated 2 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 10 months ago
- Reverse engineering the TI AM3358 boot ROM☆62Aug 25, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆46Jun 1, 2025Updated 10 months ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated last month
- A MBR Fuzzer☆31Apr 3, 2024Updated 2 years ago
- rpv-web is a browser based frontend for the rpv library☆27Nov 21, 2025Updated 5 months ago
- ☆15Mar 21, 2025Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 4 years ago
- List of some AD tools I frequently use☆57Nov 2, 2025Updated 5 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- BINARLY Research Tools and PoCs☆39Sep 27, 2024Updated last year
- Checker de Spotify en la terminal [TERMUX]☆21Feb 26, 2023Updated 3 years ago
- ☆50Mar 12, 2026Updated last month
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆99Apr 2, 2025Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆88Feb 22, 2025Updated last year
- rpv is a v library for analyzing RPC servers and interfaces on the Windows operating system☆38Nov 21, 2025Updated 5 months ago
- ☆11Apr 8, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Apr 15, 2026Updated 2 weeks ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Dec 29, 2024Updated last year
- Talk2Me interacts with OpenAI's language model to generate text responses and saves the conversation for future reference.☆16Sep 6, 2024Updated last year
- Home of https://redteam.guide☆15Apr 1, 2026Updated 3 weeks ago
- ☆127Dec 17, 2024Updated last year
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 9 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆30Aug 24, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- ☆20Jan 2, 2026Updated 3 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Basic USB passthrough from a host PC to a Beaglebone Black (or any device capable of using GadgetFs)☆17Oct 9, 2016Updated 9 years ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆16Mar 20, 2025Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago