Samsung / CredSweeper
CredSweeper is a tool to detect credentials in any directories or files. CredSweeper could help users to detect unwanted exposure of credentials (such as token, passwords, api keys etc.) in advance. By scanning lines, filtering, and using AI model as option, CredSweeper reports lines with possible credentials, where the line is, and expected typ…
☆118Updated last week
Alternatives and similar repositories for CredSweeper:
Users that are interested in CredSweeper are comparing it to the libraries listed below
- CredData is a set of files including credentials in open source projects. CredData includes suspicious lines with manual review results a…☆33Updated last week
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆110Updated last year
- A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654☆38Updated 11 months ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆98Updated 6 months ago
- A ChatGPT based penetration testing findings generator.☆131Updated last year
- How long will it take to crack a hash ?☆29Updated 5 years ago
- IOCs from Google's Threat Analysis Group (TAG)☆29Updated 3 months ago
- Community reconstruction of the legacy JSON NVD Data Feeds. This project uses and redistributes data from the NVD API but is neither endo…☆145Updated this week
- A LLM explicitly designed for getting hacked☆139Updated last year
- Trail of Bits Testing Handbook☆66Updated 3 weeks ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆32Updated this week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆72Updated last year
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆187Updated this week
- ☆114Updated last year
- Atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.☆63Updated this week
- Python implementation inspired from ICSim☆25Updated last year
- ☆31Updated 2 years ago
- A very simple open source implementation of Google's Project Naptime☆127Updated this week
- Golang installer for DefectDojo☆27Updated 2 months ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆37Updated 3 years ago
- Nuclei plugins to audit Chrome extensions☆64Updated 8 months ago
- This contains a list of tools for security assessments of android applications.☆25Updated 3 years ago
- ☆62Updated last year
- Daily updates from leaked data search engines, aggregators and similar services.☆94Updated this week
- CveXplore☆38Updated this week
- Generative web directory fuzzer,crawling and subdomain checker based on chatgpt☆14Updated 10 months ago
- Automated vulnerability discovery and annotation☆65Updated 8 months ago
- OWASP Foundation Web Respository☆28Updated 7 months ago
- OSS-Fuzz vulnerabilities for OSV.☆149Updated this week
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆42Updated 2 years ago