A library for detecting known secrets across many web frameworks
☆786Mar 20, 2026Updated this week
Alternatives and similar repositories for badsecrets
Users that are interested in badsecrets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- project-blacklist3r☆637Oct 3, 2025Updated 5 months ago
- An IIS short filename enumeration tool☆1,132Nov 25, 2024Updated last year
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,782May 22, 2024Updated last year
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆701May 7, 2025Updated 10 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,209Jan 5, 2026Updated 2 months ago
- The recursive internet scanner for hackers. 🧡☆9,513Updated this week
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆733Sep 3, 2025Updated 6 months ago
- IIS shortname scanner written in Go☆355Mar 25, 2023Updated 2 years ago
- The Network Execution Tool☆5,356Updated this week
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,533Mar 8, 2026Updated 2 weeks ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆755Dec 19, 2023Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆786Updated this week
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,273Dec 9, 2025Updated 3 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆987Jan 12, 2024Updated 2 years ago
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆936Aug 24, 2023Updated 2 years ago
- Automated learning of regexes for DNS discovery☆390Feb 18, 2023Updated 3 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,645Sep 3, 2023Updated 2 years ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,363Aug 6, 2025Updated 7 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆795Updated this week
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- Rockyou for web fuzzing☆3,094Mar 11, 2026Updated last week
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,568Mar 8, 2026Updated 2 weeks ago
- Real-world infosec wordlists, updated regularly☆1,725Updated this week
- BChecks collection for Burp Suite Professional and Burp Suite DAST☆773Mar 12, 2026Updated last week
- DPAPI looting remotely and locally in Python☆543Mar 13, 2026Updated last week
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,122Feb 27, 2026Updated 3 weeks ago
- Filter and enrich a list of subdomains by level☆210Sep 25, 2023Updated 2 years ago
- Contextual Content Discovery Tool☆3,121Apr 29, 2024Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆90May 2, 2024Updated last year
- Fileless atexec, no more need for port 445☆406Mar 28, 2024Updated last year
- Generate tens of thousands of subdomain combinations in a matter of seconds☆273Sep 25, 2023Updated 2 years ago
- ☆520Apr 29, 2024Updated last year
- Deserialization payload generator for a variety of .NET formatters☆3,691Dec 23, 2024Updated last year
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,135Oct 21, 2024Updated last year
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,953Oct 4, 2025Updated 5 months ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,853Jan 1, 2025Updated last year
- The swiss army knife of LSASS dumping☆2,081Sep 17, 2024Updated last year