feeltheajf / trufflehog3
Find secrets in your codebase
☆123Updated 2 weeks ago
Alternatives and similar repositories for trufflehog3:
Users that are interested in trufflehog3 are comparing it to the libraries listed below
- ☆110Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 4 years ago
- Scan DockerHub images that match a keyword to find secrets.☆55Updated 4 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆114Updated last year
- A utility to convert your AWS CLI credentials into AWS console access.☆235Updated 4 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆102Updated last month
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆269Updated 6 months ago
- Protect against subdomain takeover☆93Updated 10 months ago
- FestIn - Open S3 Bucket Scanner☆231Updated 4 years ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago
- S3 Account Search☆269Updated 5 months ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.☆110Updated 2 months ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆198Updated 2 years ago
- Fast and stealthy Amazon S3 bucket enumeration tool for pentesters.☆245Updated last week
- Cloud agnostic IAM permissions enumerator☆140Updated 6 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- ☆123Updated last year
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆222Updated 4 months ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated last year
- find dangling domains in a multi cloud environment☆140Updated this week
- Secrets scanner that understands code☆188Updated last year
- Search exposed EBS volumes for secrets☆297Updated last year
- Route53/CloudFront Vulnerability Assessment Utility☆85Updated last year
- Scans Slack for API tokens, credentials, passwords, and more using YARA rules☆39Updated 4 years ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆167Updated last month
- Benchmarking repo for secrets scanning☆231Updated 7 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated 3 weeks ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆171Updated 6 years ago
- boostsecurityio/lotp☆116Updated last week