KeySec Hunter is a **Chrome extension** that scans webpages and linked JavaScript files for **user-defined keywords** and **potential secrets** (API keys, tokens, passwords, credentials, etc.). It’s built for security researchers, developers, and bug bounty hunters who want to quickly detect sensitive data leaks during web analysis.
☆59Dec 21, 2025Updated 3 months ago
Alternatives and similar repositories for keysec-hunter---Chrome-extension
Users that are interested in keysec-hunter---Chrome-extension are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Feb 10, 2026Updated 2 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 10 months ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 7 months ago
- Analyze an APK archive.☆28Feb 24, 2024Updated 2 years ago
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆43Dec 4, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Pentesting Apache Tomcat 101☆14Apr 4, 2023Updated 3 years ago
- Analyze Content-Security-Policy header of a given URL.☆33Jan 10, 2024Updated 2 years ago
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆193Mar 25, 2026Updated 3 weeks ago
- Burp Suite Professional Edition .☆19Jul 24, 2025Updated 8 months ago
- ☆16Mar 3, 2025Updated last year
- An intentionally vulnerable web application for learning penetration testing techniques.☆31Feb 2, 2026Updated 2 months ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 2 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Dos-attacX is a framework designed for educational purposes to simulate a single-machine attack on a target's server. This tool sends con…☆19Oct 16, 2025Updated 5 months ago
- ☆11Jun 30, 2025Updated 9 months ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 7 months ago
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 6 months ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆11Sep 20, 2019Updated 6 years ago
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last month
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- BadGPT is a robust framework designed to simplify and optimize the bug bounty process. Equipped with a suite of tools for reconnaissance,…☆24Dec 1, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- httpx cmd输出转xlsx 带色彩☆15Apr 12, 2022Updated 4 years ago
- ☆18Jul 11, 2025Updated 9 months ago
- ExtPenPy is a tool that will help you finalizing your recon phase faster.☆17Dec 4, 2024Updated last year
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 6 months ago
- ☆14Nov 15, 2020Updated 5 years ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- Use claude code anywhere.☆61Mar 27, 2026Updated 2 weeks ago
- This lab is for **EDUCATIONAL PURPOSES ONLY**. Use it responsibly and only on systems you own or have explicit permission to test. Do not…☆18Feb 20, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Dec 21, 2025Updated 3 months ago
- My collection of hacking books for learning information security☆31Dec 25, 2022Updated 3 years ago
- API Penetration Testing Notes☆17Sep 25, 2025Updated 6 months ago
- ☆26Feb 21, 2026Updated last month
- A collection of open source and commercial tools that aid in red team operations.☆14Jun 14, 2018Updated 7 years ago
- Backport of SliverStager to work with DotNetToJScript for vba☆17Aug 9, 2024Updated last year
- ☆40Sep 21, 2025Updated 6 months ago