Secrets scanner that understands code
☆191Nov 2, 2023Updated 2 years ago
Alternatives and similar repositories for deepsecrets
Users that are interested in deepsecrets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Secrets scanner that understands code☆166Dec 3, 2025Updated 4 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆279Sep 11, 2025Updated 7 months ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- navgix is a multi-threaded golang tool that will check for nginx alias traversal vulnerabilities☆74May 20, 2023Updated 2 years ago
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,181Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Discover hidden debugging parameters and uncover web application secrets☆248Feb 4, 2026Updated 2 months ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆141Jun 7, 2025Updated 10 months ago
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆116Jul 17, 2024Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 5 months ago
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆87Nov 22, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilities☆49Dec 14, 2023Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆229Apr 17, 2026Updated 2 weeks ago
- Simple PoC for demonstrating Race Conditions on Websockets☆54Sep 14, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆437Dec 30, 2025Updated 4 months ago
- Microsoft Graph API post-exploitation toolkit☆95Jul 13, 2024Updated last year
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆272Sep 14, 2023Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- ☆12Jan 30, 2025Updated last year
- A rapid HTTP downgrade smuggling scanner written in Go.☆314May 16, 2024Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 4 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Sep 11, 2024Updated last year
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆91Sep 12, 2023Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆756Dec 19, 2023Updated 2 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆356Apr 21, 2026Updated last week
- ☆106Jan 3, 2023Updated 3 years ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆843Mar 24, 2026Updated last month
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,821May 22, 2024Updated last year
- ☆93Dec 15, 2025Updated 4 months ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,410Aug 6, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆357Dec 14, 2023Updated 2 years ago
- ☆109Feb 21, 2023Updated 3 years ago
- ☆18Mar 26, 2024Updated 2 years ago
- ☆17May 16, 2022Updated 3 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆176Nov 7, 2022Updated 3 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 4 years ago