Secrets scanner that understands code
☆192Nov 2, 2023Updated 2 years ago
Alternatives and similar repositories for deepsecrets
Users that are interested in deepsecrets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Secrets scanner that understands code☆166Dec 3, 2025Updated 5 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆278Sep 11, 2025Updated 8 months ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- navgix is a multi-threaded golang tool that will check for nginx alias traversal vulnerabilities☆74May 20, 2023Updated 3 years ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,194Updated this week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Discover hidden debugging parameters and uncover web application secrets☆248Feb 4, 2026Updated 3 months ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆140Jun 7, 2025Updated 11 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 5 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆86Nov 22, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆230Apr 17, 2026Updated last month
- Simple PoC for demonstrating Race Conditions on Websockets☆54Sep 14, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆438Dec 30, 2025Updated 4 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆273Sep 14, 2023Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- ☆12Jan 30, 2025Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆314May 16, 2024Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆122Dec 13, 2025Updated 5 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆91Sep 12, 2023Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆758Dec 19, 2023Updated 2 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆358Apr 21, 2026Updated last month
- ☆105Jan 3, 2023Updated 3 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated 2 years ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆845May 13, 2026Updated last week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,829May 22, 2024Updated 2 years ago
- ☆93Dec 15, 2025Updated 5 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆357Dec 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,480Aug 6, 2025Updated 9 months ago
- ☆109Feb 21, 2023Updated 3 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- ☆17May 16, 2022Updated 4 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆177Nov 7, 2022Updated 3 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 4 years ago