Puliczek / awesome-list-of-secrets-in-environment-variables
π¦π Awesome list of secrets in environment variables π₯οΈ
β886Updated 2 years ago
Alternatives and similar repositories for awesome-list-of-secrets-in-environment-variables:
Users that are interested in awesome-list-of-secrets-in-environment-variables are comparing it to the libraries listed below
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..eβ¦β971Updated 10 months ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.β1,139Updated 8 months ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.β899Updated this week
- β1,001Updated 3 years ago
- β1,184Updated 2 years ago
- β750Updated 10 months ago
- πͺ CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.β877Updated 3 months ago
- bypass-url-parserβ1,067Updated last week
- Tool to check for dependency confusion vulnerabilities in multiple package management systemsβ718Updated 8 months ago
- Payload Arsenal for Pentration Tester and Bug Bounty Huntersβ900Updated last year
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hacβ¦β958Updated this week
- Golden Guideβ484Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,884Updated last year
- An automated SSRF finder. Just give the domain name and your server and chill! ;) Also has options to find XSS and open redirectsβ957Updated 3 years ago
- Identify privilege escalation paths within and across different cloudsβ687Updated last week
- Awesome cloud enumeratorβ1,003Updated last month
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β865Updated last year
- Real-world infosec wordlists, updated regularlyβ1,484Updated this week
- Dangerously fast DNS/network/port scannerβ900Updated 3 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. π‘οΈβοΈπ§β1,754Updated 10 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)β1,302Updated 2 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerabilityβ866Updated 3 years ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single locationβ1,249Updated 4 years ago
- Hide your payload in DNSβ613Updated last year
- Awesome information for WebSockets security researchβ267Updated 3 years ago
- π Don't know what type of hash it is? Name That Hash will name that hash type! π€ Identify MD5, SHA256 and 300+ other hashes β Comes wiβ¦β1,544Updated last month
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!β2,032Updated last month
- Tool to help exploit XXE vulnerabilitiesβ559Updated 2 years ago
- β387Updated 3 years ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned entβ¦β1,859Updated 5 months ago