π¦π Awesome list of secrets in environment variables π₯οΈ
β907Sep 21, 2022Updated 3 years ago
Alternatives and similar repositories for awesome-list-of-secrets-in-environment-variables
Users that are interested in awesome-list-of-secrets-in-environment-variables are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π© π€π» [P1-$10,000] Google Chrome, Microsoft Edge and Opera - vulnerability reported by Maciej Pulikowski - System environment variablesβ¦β342Sep 4, 2022Updated 3 years ago
- π±βπ» βοΈ π€¬ CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricksβ951Jan 15, 2022Updated 4 years ago
- β1,202Sep 2, 2022Updated 3 years ago
- π±βπ» π Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2β¦β173Mar 22, 2021Updated 5 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID securityβ176Oct 26, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerabilityβ965Dec 31, 2021Updated 4 years ago
- π Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.β428Apr 8, 2026Updated last week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!β1,944Oct 7, 2023Updated 2 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac β¦β1,172Jan 21, 2026Updated 2 months ago
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkitβ450Nov 2, 2023Updated 2 years ago
- declutters url lists for crawling/pentestingβ1,545Feb 23, 2025Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.β612Mar 4, 2021Updated 5 years ago
- "Can I take over DNS?" β a list of DNS providers and how to claim vulnerable domains.β1,085Mar 3, 2025Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.β6,172Aug 14, 2024Updated last year
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β1,074Mar 24, 2026Updated 3 weeks ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communitβ¦β3,745Nov 23, 2025Updated 4 months ago
- A robust Red Team proxy written in Go.β164Dec 26, 2021Updated 4 years ago
- Rust-based high performance domain permutation generator.β299Dec 2, 2023Updated 2 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..eβ¦β1,154Apr 3, 2026Updated 2 weeks ago
- Unleash the power of cloudβ816Nov 19, 2024Updated last year
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)β289Sep 26, 2023Updated 2 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password π‘οΈβ6,470Apr 12, 2026Updated last week
- π Collection of regexp pattern for security passive scanningβ116Feb 18, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findinβ¦β7,444Apr 10, 2026Updated last week
- A repository that includes all the important wordlists used while bug hunting.β1,396Mar 11, 2023Updated 3 years ago
- Contextual Content Discovery Toolβ3,145Apr 29, 2024Updated last year
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.β1,302Aug 7, 2024Updated last year
- Proof of concept code for Datadog Security Labs referenced exploits.β449Apr 6, 2026Updated last week
- Rockyou for web fuzzingβ3,121Mar 11, 2026Updated last month
- Detects request smuggling via HTTP/2 downgrades.β94Jul 30, 2022Updated 3 years ago
- πͺ CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.β968Jan 10, 2025Updated last year
- Grafana Unauthorized arbitrary file reading vulnerabilityβ368Feb 14, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This repo has been replaced by https://www.cloudvulndb.orgβ727Jun 29, 2022Updated 3 years ago
- Content-Type Researchβ661Jun 29, 2025Updated 9 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.β1,018Updated this week
- β755Jun 26, 2024Updated last year
- The Swiss Army knife for automated Web Application Testingβ2,328May 8, 2024Updated last year
- A collection of hacks and one-off scriptsβ2,461Mar 13, 2025Updated last year
- Automating situational awareness for cloud penetration tests.β2,340Apr 12, 2026Updated last week