daylen / api-key-detect
Scan a codebase for API keys and passwords
☆46Updated 4 years ago
Alternatives and similar repositories for api-key-detect:
Users that are interested in api-key-detect are comparing it to the libraries listed below
- Undocumented Amazon S3 APIs and third-party extensions☆70Updated 3 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 3 years ago
- This repo contains a list of aws security related talks.☆12Updated 7 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- 🔐💥 KeyNuker - nuke AWS keys accidentally leaked to Github☆90Updated 6 years ago
- Docker container for Zachary Rice Gitleaks☆20Updated 5 years ago
- Amazon S3 bucket spelunking!☆86Updated 7 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- ☆11Updated 8 years ago
- List of special metadata IPs used in cloud services☆11Updated 5 years ago
- A set of functions implemented using lambda-cfn to monitor an organization's AWS infrastructure for best practices, security and complian…☆17Updated 5 years ago
- This command line tool counts the number of resources in different categories across Amazon regions.☆59Updated 5 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- it-security related scripts and tools☆25Updated 5 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆142Updated 6 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆85Updated last year
- Creates a CloudFormation stack for running Security Monkey☆27Updated 6 years ago
- Listo. Use questionnaires and checklists to make it easy to do the right thing, regarding the software you build.☆28Updated 2 years ago
- A very vulnerable serverless application in AWS Lambda☆95Updated 5 years ago
- Scripts for AWS amusement...☆21Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- AWS Metadata Proxy for protection against SSRF☆68Updated 5 years ago
- Example detection of compromise credentials in AWS☆122Updated 6 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Updated 7 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆91Updated last year
- Demo - how to easily build security testing for Web App, using Zap and Glue☆59Updated 4 years ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Updated 6 years ago
- Scan secrets from Continuous Integration Build Logs☆52Updated 5 years ago
- AWS S3 Hacks☆78Updated 6 years ago
- scan s3 buckets for security issues☆85Updated 8 months ago