You can find hardcoded Api-Key,Secret,Token Etc..
☆77Sep 3, 2022Updated 3 years ago
Alternatives and similar repositories for Find-Hardcoded
Users that are interested in Find-Hardcoded are comparing it to the libraries listed below
Sorting:
- ☆32Dec 30, 2022Updated 3 years ago
- XSS Finder Via SSTI☆56Sep 14, 2023Updated 2 years ago
- S3 Recon tips and tricks collected from different resources,Sorry if i missed to mention all resources owners☆27Nov 13, 2021Updated 4 years ago
- ☆96Oct 1, 2021Updated 4 years ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆15Mar 22, 2023Updated 2 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- Most of the Google Acquisitions for Bug Bounty Hunter.☆64Sep 3, 2022Updated 3 years ago
- Droz_scan is a automated script, that runs all the queries of drozer in a single run☆26May 15, 2023Updated 2 years ago
- 31 Tips for pentesters & security engineers☆86Aug 20, 2021Updated 4 years ago
- This tool aims at accumulating javascript files from a given set of subdomains to discover hidden endpoints. It swims through JS files to…☆62Dec 28, 2022Updated 3 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- ☆10Jun 13, 2024Updated last year
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- Script for Bug Bounty☆29Sep 17, 2021Updated 4 years ago
- Nuclei Templates - Here you will find the templates I use while hunting☆120Sep 27, 2021Updated 4 years ago
- A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.☆109Mar 1, 2022Updated 3 years ago
- ☆436Jun 1, 2021Updated 4 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- 🔍LeakScanner - Inspired by Gitleaks☆13Aug 23, 2024Updated last year
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Project Morya is just a collection of bash scripts that runs iteratively to carry out various tools and recon process & store output in a…☆72Mar 5, 2022Updated 3 years ago
- Detailed information about API key / OAuth token (Description, Request, Response, Regex, Example)☆288Sep 26, 2023Updated 2 years ago
- It's an watcher for new scopes added to bounty-targets-data and send you alert to Slack.☆59Mar 2, 2022Updated 3 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- One liner regex match to search inside JS files, using curl and grep!☆29Dec 26, 2021Updated 4 years ago
- Archive of Potential Insider Threats☆152Sep 25, 2023Updated 2 years ago
- My Tools For Bug Bounty☆69Sep 23, 2024Updated last year
- GoWC - Wildcard cleaner for MassDNS☆24Jun 10, 2022Updated 3 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Jun 23, 2024Updated last year
- Write-ups of my findings.☆123Sep 2, 2023Updated 2 years ago
- KakHunt is a python GUI Tool private tool which earns me 100s of bugs every month. It spawns URLS and filters Sensitive Info.☆49Apr 27, 2023Updated 2 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago