apuigsech / seekretLinks
Go library and command line to seek for secrets on various sources.
☆242Updated 6 years ago
Alternatives and similar repositories for seekret
Users that are interested in seekret are comparing it to the libraries listed below
Sorting:
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆192Updated 6 years ago
- ☆128Updated 10 years ago
- Self contained cross platform DNS recon tool☆187Updated 8 years ago
- blacksheepwall is a hostname reconnaissance tool☆302Updated 5 years ago
- Recon, Subdomain Bruting, Zone Transfers☆230Updated 9 years ago
- Probably one of the smallest SSL MITM proxies you can make☆183Updated 10 years ago
- Deprecated please use https://github.com/Netflix/sleepy-puppy☆97Updated 7 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 7 years ago
- Minion☆355Updated 6 years ago
- Mass scanner for the Java serialize bug☆152Updated 7 months ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆602Updated 3 years ago
- Tools for auditing WAFS☆464Updated 5 years ago
- ☆314Updated 9 years ago
- ☆73Updated 12 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆141Updated 8 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 7 years ago
- Tool used to continuously monitor a Github org for mistaken public commits☆167Updated 9 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 9 years ago
- [depreciated] Terminal dashboard for bug bounty hunters that use HackerOne and Bugcrowd☆194Updated 9 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆167Updated 2 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Updated 9 years ago
- Proof of Concept code for CVE-2016-5696☆102Updated 9 years ago
- A CSRF demonstration of stealing local Redis data, and encrypting all Redis instances on a local network☆53Updated 8 years ago
- Tagging and annotation framework for scan data☆101Updated 7 years ago
- Password lists obtained from strangers attempting to log in to my server.☆223Updated 7 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆204Updated 9 years ago
- This is a LEGACY repo head to☆134Updated last year
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- High-interaction MitM SSH honeypot☆172Updated 7 years ago
- A regex based source code scanner.☆127Updated 8 years ago