Samsung / CredSweeper
CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of credentials (such as token, passwords, api keys etc.) in advance. By scanning lines, filtering, and using AI model as option, CredSweeper reports lines with possible credentials, where the line is, and expected typ…
☆116Updated this week
Alternatives and similar repositories for CredSweeper:
Users that are interested in CredSweeper are comparing it to the libraries listed below
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆32Updated this week
- Cybersecurity Intelligent Pentesting Helper for Ethical Researcher (CIPHER). Fine tuned LLM for penetration testing guidance based on wri…☆18Updated last month
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆108Updated last year
- Bluetooth Security Assessment Methodology☆112Updated 8 months ago
- OSS-Fuzz vulnerabilities for OSV.☆147Updated this week
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆152Updated 2 months ago
- Archive of Potential Insider Threats☆143Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆88Updated 10 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆214Updated 2 weeks ago
- 🔍A cutting edge context aware GraphQL API fuzzing tool!☆133Updated this week
- A LLM explicitly designed for getting hacked☆136Updated last year
- Trail of Bits Testing Handbook☆60Updated last week
- ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offen…☆205Updated last month
- QRFuzz, a fuzzing toolkit to test malicious QR Codes in mobile applications☆45Updated 9 months ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- IOCs from Google's Threat Analysis Group (TAG)☆29Updated 2 months ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆178Updated this week
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆204Updated 2 months ago
- CLI tool for fetching URLs from Wayback Machine, Common Crawl, and VirusTotal.☆35Updated 3 months ago
- An Interface for AI built for cybersecurity professionals☆89Updated this week
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear and Zendesk☆53Updated last month
- How long will it take to crack a hash ?☆29Updated 4 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆95Updated 4 months ago
- ☆29Updated last week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆447Updated 10 months ago
- Atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆62Updated 3 weeks ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆436Updated this week
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆103Updated last year
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆193Updated last year
- ☆136Updated 6 months ago