c3l3si4n / webtrufflehogLinks
Browser extension that leverages TruffleHog and Native Messaging Hosts to scan web traffic in real-time for exposed secrets
☆111Updated 6 months ago
Alternatives and similar repositories for webtrufflehog
Users that are interested in webtrufflehog are comparing it to the libraries listed below
Sorting:
- Extracts URLs from OSINT Archives for Security Insights☆146Updated this week
- This script Crawl the website and find the urls that contains html forms.☆71Updated last year
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆48Updated 6 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆88Updated 7 months ago
- The Most Advanced Client-Side Prototype Pollution Scanner☆226Updated 3 weeks ago
- Search for all leaked keys/secrets using one regex! bugbounty☆133Updated 3 months ago
- Ultimate Tasks Automation Framework for Hackers, DevSecOps, Pentesters, and Bug-bounty hunters!☆150Updated 7 months ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆34Updated last year
- ☆118Updated last year
- Lightning-fast passive subdomain discovery tool for security professionals and bug bounty hunters.☆349Updated 2 months ago
- A fast, minimalistic scanner for time-based SQL injection (SQLi) detection – built in Go.☆126Updated 2 months ago
- SubOwner - A Simple tool check for subdomain takeovers.☆113Updated 8 months ago
- This tool will check for Sensitive Data Leakage with some useful patterns/RegEx. The patterns are mostly targeted on waybackdata and filt…☆229Updated last month
- AI/LLM local model integration for analysis of reconftw results☆65Updated 2 months ago
- Official TruffleHog Burp Suite Extension. Scan Burp Suite traffic for 800+ different types of secrets (API keys, passwords, SSH keys, etc…☆71Updated 4 months ago
- 1C RAS Offensive Security Tool☆26Updated last year
- Docker Remote API Scanner and Exploit☆175Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆229Updated 11 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆100Updated 2 months ago
- Check bitrix vulnerabilities☆75Updated last year
- ☆171Updated last month
- Google IP Search Engine☆149Updated 3 years ago
- JSNinja is a powerful tool designed for security researchers and developers looking to extract sensitive information and Urls from JavaSc…☆126Updated 7 months ago
- Gourlex is a simple tool that can be used to extract URLs and paths from web pages.☆234Updated last year
- Nmap script that scans for probable vulnerabilities based on services discovered in open ports.☆205Updated 4 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆157Updated 2 months ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆93Updated last week
- A passive way to find backups/ sensitive information.☆84Updated last week
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆370Updated 6 months ago
- ☆32Updated 2 weeks ago