blacklanternsecurity / secrets-patterns-dbLinks
Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.
☆9Updated 2 years ago
Alternatives and similar repositories for secrets-patterns-db
Users that are interested in secrets-patterns-db are comparing it to the libraries listed below
Sorting:
- Rockyou for web fuzzing☆14Updated 3 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- Automate bug bounty recon using bash alias☆14Updated 10 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- ☆15Updated 2 years ago
- A proving grounds for young and aspiring BBOT modules☆14Updated 2 years ago
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆15Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Automated Recon Tool Installer☆16Updated 2 years ago
- Gampung tools for find nuclei template from github☆10Updated last year
- ☆15Updated 2 years ago
- Wordlist generator☆16Updated 4 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆32Updated 4 months ago
- Simple tools to handle string and generate subdomain permutations☆15Updated 3 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated last month
- Tool for fetching all the available waybackmachine snapshot urls☆21Updated 8 months ago
- parse ffuf & map endpoints to wordlists☆20Updated 4 years ago
- Quick tool to create custom wordlists like how fuzzers work☆10Updated last year
- Find subdomains by searching public certificate records☆16Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- Script Recon Bug Bounty☆10Updated 4 years ago
- A set of tools, procedures, and playbooks for performing bug bounties☆16Updated 6 years ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆17Updated last year
- ☆11Updated 4 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆8Updated 3 years ago
- Generating Sub-Sub-Subdomain + validating all of them☆10Updated 2 years ago
- It finds Subject Alternative Names for a given list of domains☆8Updated 3 years ago