Puliczek / awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
☆867Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-list-of-secrets-in-environment-variables
- Awesome cloud enumerator☆895Updated 3 months ago
- bypass-url-parser☆1,023Updated last week
- Identify privilege escalation paths within and across different clouds☆668Updated 2 weeks ago
- ☆1,177Updated 2 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,851Updated last year
- Tool to bypass 403/40X response codes.☆1,113Updated 3 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,688Updated last month
- 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks☆935Updated 2 years ago
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆877Updated this week
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆936Updated 4 months ago
- Reverse proxies cheatsheet☆1,782Updated last year
- Making Favicon.ico based Recon Great again !☆1,128Updated last year
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,048Updated 9 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,576Updated 2 months ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆835Updated last month
- Notes about attacking Jenkins servers☆1,966Updated 4 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆861Updated this week
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,040Updated 7 months ago
- Azure Security Resources and Notes☆1,486Updated 5 months ago
- Real-world infosec wordlists, updated regularly☆1,400Updated this week
- BugBountyTips☆403Updated 5 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆845Updated 10 months ago
- Automated & Manual Wordlists provided by Assetnote☆1,328Updated 3 months ago
- A list of vulnerabilities or design flaws that Microsoft does not intend to fix. Since the number is growing, I decided to make a list. T…☆939Updated 3 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,739Updated 5 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,207Updated 5 months ago
- ☆1,581Updated last month
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,065Updated 3 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,424Updated 6 months ago
- ☆990Updated 2 years ago