A library for detecting known secrets across many web frameworks
☆794Apr 8, 2026Updated this week
Alternatives and similar repositories for badsecrets
Users that are interested in badsecrets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- project-blacklist3r☆641Oct 3, 2025Updated 6 months ago
- An IIS short filename enumeration tool☆1,139Nov 25, 2024Updated last year
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆661Feb 1, 2025Updated last year
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,812May 22, 2024Updated last year
- Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!)☆702May 7, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,221Jan 5, 2026Updated 3 months ago
- The recursive internet scanner for hackers. 🧡☆9,583Apr 8, 2026Updated last week
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- Proof-of-Concept tool to authenticate to an LDAP/S server with a certificate through Schannel☆737Sep 3, 2025Updated 7 months ago
- IIS shortname scanner written in Go☆353Mar 25, 2023Updated 3 years ago
- The Network Execution Tool☆5,407Apr 6, 2026Updated last week
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,543Mar 8, 2026Updated last month
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆753Dec 19, 2023Updated 2 years ago
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆796Apr 2, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,275Dec 9, 2025Updated 4 months ago
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆939Aug 24, 2023Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,069Mar 24, 2026Updated 3 weeks ago
- Automated learning of regexes for DNS discovery☆391Feb 18, 2023Updated 3 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,650Sep 3, 2023Updated 2 years ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,380Aug 6, 2025Updated 8 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆839Mar 24, 2026Updated 3 weeks ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆298Sep 8, 2023Updated 2 years ago
- Rockyou for web fuzzing☆3,113Mar 11, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,588Mar 8, 2026Updated last month
- Real-world infosec wordlists, updated regularly☆1,736Updated this week
- BChecks collection for Burp Suite Professional and Burp Suite DAST☆776Mar 12, 2026Updated last month
- DPAPI looting remotely and locally in Python☆546Mar 13, 2026Updated last month
- BloodyAD is an Active Directory Privilege Escalation Framework☆2,150Updated this week
- Contextual Content Discovery Tool☆3,139Apr 29, 2024Updated last year
- Filter and enrich a list of subdomains by level☆213Sep 25, 2023Updated 2 years ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆91May 2, 2024Updated last year
- Fileless atexec, no more need for port 445☆406Mar 28, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Generate tens of thousands of subdomain combinations in a matter of seconds☆275Sep 25, 2023Updated 2 years ago
- ☆522Apr 29, 2024Updated last year
- Deserialization payload generator for a variety of .NET formatters☆3,706Dec 23, 2024Updated last year
- Active Directory data ingestor for BloodHound Legacy written in Rust. 🦀☆1,138Oct 21, 2024Updated last year
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,965Oct 4, 2025Updated 6 months ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.☆4,883Mar 20, 2026Updated 3 weeks ago
- StandIn is a small .NET35/45 AD post-exploitation toolkit☆845Dec 2, 2023Updated 2 years ago