An advanced scanner for exposed secrets in web pages, APIs, and source code.
☆13Apr 22, 2025Updated 10 months ago
Alternatives and similar repositories for Profanatica-Secret-Scanner
Users that are interested in Profanatica-Secret-Scanner are comparing it to the libraries listed below
Sorting:
- CraftCMS RCE Checker (CVE-2025-32432)☆10Apr 27, 2025Updated 10 months ago
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- Kernel for Alioth devices based on Xiaomi SM8250 with Nethunter support☆18Feb 18, 2024Updated 2 years ago
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- Reverse engineering the TI AM3358 boot ROM☆60Aug 25, 2024Updated last year
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆46Jun 1, 2025Updated 9 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- Top passwords as per HaveIBeenPwned☆33Mar 12, 2026Updated last week
- A MBR Fuzzer☆31Apr 3, 2024Updated last year
- rpv-web is a browser based frontend for the rpv library☆27Nov 21, 2025Updated 3 months ago
- ☆15Mar 21, 2025Updated 11 months ago
- List of some AD tools I frequently use☆56Nov 2, 2025Updated 4 months ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆52Mar 26, 2022Updated 3 years ago
- Checker de Spotify en la terminal [TERMUX]☆20Feb 26, 2023Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- BINARLY Research Tools and PoCs☆40Sep 27, 2024Updated last year
- ☆49Mar 12, 2026Updated last week
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆86Feb 22, 2025Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- ☆11Apr 8, 2024Updated last year
- rpv is a v library for analyzing RPC servers and interfaces on the Windows operating system☆38Nov 21, 2025Updated 3 months ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Feb 18, 2026Updated last month
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Dec 29, 2024Updated last year
- Talk2Me interacts with OpenAI's language model to generate text responses and saves the conversation for future reference.☆15Sep 6, 2024Updated last year
- ☆123Dec 17, 2024Updated last year
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Converts a 3DS program's EXEFS to an (IDA-loadable) ELF☆12Apr 13, 2017Updated 8 years ago
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆29Aug 24, 2024Updated last year
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- ☆20Jan 2, 2026Updated 2 months ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Basic USB passthrough from a host PC to a Beaglebone Black (or any device capable of using GadgetFs)☆17Oct 9, 2016Updated 9 years ago
- Python substitute and transposition ciphers including Vigenère Cipher, Rail Fence Cipher, Caesar Cipher☆10Jul 16, 2021Updated 4 years ago
- Find secrets and passwords in container images and file systems☆15Nov 16, 2022Updated 3 years ago