feeltheajf / trufflehog3
Find secrets in your codebase
☆123Updated 2 months ago
Alternatives and similar repositories for trufflehog3
Users that are interested in trufflehog3 are comparing it to the libraries listed below
Sorting:
- Protect against subdomain takeover☆92Updated 11 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆104Updated 3 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆231Updated 6 months ago
- boostsecurityio/lotp☆125Updated last month
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆271Updated 7 months ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- OWASP Domain Protect - prevent subdomain takeover☆397Updated 4 months ago
- ☆110Updated last year
- A project to visualize the software supply chain☆50Updated last year
- Search exposed EBS volumes for secrets☆298Updated 2 years ago
- These are the regexes that power truffleHog☆218Updated 2 years ago
- S3 Account Search☆4Updated 6 months ago
- Tool for auditing RBACs in Kubernetes☆219Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆218Updated 3 weeks ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆344Updated 4 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆118Updated last year
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- ☆123Updated last year
- A utility to convert your AWS CLI credentials into AWS console access.☆238Updated 5 years ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.☆110Updated 4 months ago
- Scan DockerHub images that match a keyword to find secrets.☆58Updated 4 years ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆205Updated 3 years ago
- Secrets scanner that understands code☆189Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆169Updated 3 months ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆37Updated 3 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆143Updated last week
- A simple file-based scanner to look for potential AWS access and secret keys in files☆91Updated last year