Secrets scanner that understands code
☆192Nov 2, 2023Updated 2 years ago
Alternatives and similar repositories for deepsecrets
Users that are interested in deepsecrets are comparing it to the libraries listed below
Sorting:
- Secrets scanner that understands code☆168Dec 3, 2025Updated 3 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆281Sep 11, 2025Updated 6 months ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- navgix is a multi-threaded golang tool that will check for nginx alias traversal vulnerabilities☆73May 20, 2023Updated 2 years ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,134Updated this week
- Discover hidden debugging parameters and uncover web application secrets☆246Feb 4, 2026Updated last month
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆142Jun 7, 2025Updated 9 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 3 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Feb 25, 2026Updated 3 weeks ago
- Simple PoC for demonstrating Race Conditions on Websockets☆54Sep 14, 2023Updated 2 years ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆437Dec 30, 2025Updated 2 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆271Sep 14, 2023Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- ☆12Jan 30, 2025Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆736Mar 5, 2026Updated 2 weeks ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 3 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆91Sep 12, 2023Updated 2 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆341Mar 10, 2026Updated last week
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆755Dec 19, 2023Updated 2 years ago
- ☆105Jan 3, 2023Updated 3 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆795Updated this week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,782May 22, 2024Updated last year
- ☆92Dec 15, 2025Updated 3 months ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,363Aug 6, 2025Updated 7 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆358Dec 14, 2023Updated 2 years ago
- ☆109Feb 21, 2023Updated 3 years ago
- ☆18Mar 26, 2024Updated last year
- ☆17May 16, 2022Updated 3 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆175Nov 7, 2022Updated 3 years ago