arijitdirghangi / Find-HardcodedLinks
You can find hardcoded Api-Key,Secret,Token Etc..
☆79Updated 2 years ago
Alternatives and similar repositories for Find-Hardcoded
Users that are interested in Find-Hardcoded are comparing it to the libraries listed below
Sorting:
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Updated 3 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆132Updated 4 years ago
- Summary of almost all paid bounty reports on H1☆40Updated 4 years ago
- The project aims at creating target-specific wordlists for any web application that you are testing.☆66Updated 3 years ago
- Advanced Reconnaissance and Web Application Discovery☆81Updated 3 years ago
- Simple fork from degoogle original project with bug hunting purposes☆89Updated 2 years ago
- A tool for append URLs, skipping duplicates/paths & combine parameters.☆121Updated 3 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities☆104Updated 4 years ago
- Enumerate Subdomains Through Google Dorks (Bypassed Page Filter)☆124Updated 2 months ago
- AWS S3 open bucket poc automated script.☆57Updated 3 years ago
- The scripts I write to help me on my bug bounty hunting☆121Updated 3 years ago
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆92Updated 3 years ago
- ☆65Updated 2 years ago
- golang tool to scan domains or single domains with know security issues against xmlrpc☆62Updated last year
- ☆113Updated 2 years ago
- ☆38Updated 4 months ago
- Find subdomains and takeovers.☆85Updated 2 years ago
- A burp suite extension that enumerates infrastructure and application admin interfaces (OTG-CONFIG-005)☆118Updated 2 years ago
- Community curated list of template files for the nuclei engine to find security vulnerability and fingerprinting the targets.☆62Updated last year
- A path-normalization pentesting tool.☆127Updated last year
- ☆50Updated 3 years ago
- ☆95Updated 3 years ago
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in a…☆72Updated 3 years ago
- List of fresh DNS resolvers updated daily☆108Updated 2 years ago
- 🔭 Collection of regexp pattern for security passive scanning☆114Updated 2 years ago
- ☆76Updated last year
- A Proof of Concept for Clickjacking Attacks☆55Updated 4 years ago
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆48Updated 2 years ago