Find secrets in your codebase
☆124Mar 6, 2025Updated last year
Alternatives and similar repositories for trufflehog3
Users that are interested in trufflehog3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scan repository for secrets with basic defaults in place for easy setup.☆25Nov 6, 2024Updated last year
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Some nuclei templates for pentest CMS Bitrix☆41Nov 13, 2025Updated 5 months ago
- ☆30Oct 13, 2025Updated 6 months ago
- Will share some interesting writeups here :)☆18Oct 18, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Oct 15, 2022Updated 3 years ago
- Citrix Scanner for CVE-2023-3519☆53Jul 24, 2023Updated 2 years ago
- ☆20Jan 10, 2024Updated 2 years ago
- gSAST - Grep Static Analysis Security Tool☆13Mar 30, 2024Updated 2 years ago
- ☆23Updated this week
- Determine privileges from cloud credentials via brute-force testing.☆69Aug 22, 2024Updated last year
- AWS Cloud Landscape Search Engine☆20Nov 29, 2023Updated 2 years ago
- Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters☆17Aug 1, 2020Updated 5 years ago
- Quaithe empowers you to execute multiple commands in parallel for blazing-fast performance.☆28Aug 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Another Vulnerability Auditor - Community Edition☆13Jun 1, 2021Updated 4 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- Interactive results explorer and annotation tool for Nosey Parker☆58Jun 28, 2025Updated 10 months ago
- Find, verify, and analyze leaked credentials☆26,084Updated this week
- Automation to Incorporate GitHub Security Alerts Into your Business Workflow☆21Apr 26, 2023Updated 3 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- ☆17Mar 30, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Scans packages in npm and pypi for secrets☆31Nov 4, 2019Updated 6 years ago
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆65Apr 16, 2025Updated last year
- These are the regexes that power truffleHog☆226Dec 11, 2022Updated 3 years ago
- Check bitrix vulnerabilities☆95Jan 22, 2024Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Dec 6, 2024Updated last year
- SecretBench is a dataset consisting of different secret types collected from public open-source repositories.☆54Jun 13, 2024Updated last year
- JIRA Secure Attachment Looter☆70Jun 27, 2020Updated 5 years ago
- A PowerShell script to automatically configure for the highest privacy and control settings in Windows 10.☆10Aug 16, 2024Updated last year
- TurboFuzzLLM: Turbocharging Mutation-based Fuzzing for Effectively Jailbreaking Large Language Models in Practice☆24Nov 24, 2025Updated 5 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Python module for running BOFs☆80Nov 28, 2025Updated 5 months ago
- ☆13Dec 30, 2024Updated last year
- How to use Lambda and API Gateway to consume XML instead of JSON☆25Apr 10, 2023Updated 3 years ago
- Notification webhook for GoPhish☆57Jun 10, 2024Updated last year
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Cybersecurity Psychology Framework☆20Feb 22, 2026Updated 2 months ago