List of regex for scraping secret API keys and juicy information.
☆723Aug 19, 2022Updated 3 years ago
Alternatives and similar repositories for secret-regex-list
Users that are interested in secret-regex-list are comparing it to the libraries listed below
Sorting:
- Jbin will gather all the URLs from the website and then it will try to expose the secret data from them such as API keys, API secrets, AP…☆177Jul 8, 2022Updated 3 years ago
- bypass-url-parser☆1,115Updated this week
- BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔☆853Jun 27, 2022Updated 3 years ago
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆382May 19, 2023Updated 2 years ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,530Updated this week
- A simple Burp Suite extension to crawl JavaScript (JS) files in passive mode and display the results directly on the issues☆374Jul 25, 2023Updated 2 years ago
- Finding XSS during recon☆273Sep 13, 2022Updated 3 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,940Oct 7, 2023Updated 2 years ago
- Rockyou for web fuzzing☆3,033Feb 11, 2026Updated 3 weeks ago
- Smart context-based SSRF vulnerability scanner.☆360May 5, 2022Updated 3 years ago
- 🕵️ Python project to crawl for JavaScript files and search for secrets like API keys, authorization tokens, hardcoded credentials, etc.☆429May 15, 2025Updated 9 months ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,500Jan 8, 2026Updated 2 months ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆985Jan 12, 2024Updated 2 years ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆733Mar 21, 2024Updated last year
- Real-world infosec wordlists, updated regularly☆1,642Mar 2, 2026Updated last week
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,077Jul 29, 2024Updated last year
- Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests w…☆631Feb 22, 2026Updated 2 weeks ago
- Gotator is a tool to generate DNS wordlists through permutations.☆507Jul 17, 2022Updated 3 years ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,552Mar 3, 2026Updated last week
- Jeeves SQLI Finder☆215May 13, 2022Updated 3 years ago
- 1337 Wordlists for Bug Bounty Hunting☆931Updated this week
- Generate tens of thousands of subdomain combinations in a matter of seconds☆273Sep 25, 2023Updated 2 years ago
- ☆251May 25, 2021Updated 4 years ago
- De-clutter a list of URLs☆385Feb 3, 2026Updated last month
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆888May 3, 2023Updated 2 years ago
- Filter and enrich a list of subdomains by level☆208Sep 25, 2023Updated 2 years ago
- 🏴☠️ Find dead-links (broken links)☆167Mar 2, 2026Updated last week
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,280Updated this week
- A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.☆401Jan 10, 2025Updated last year
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆299Sep 8, 2023Updated 2 years ago
- A Burp Suite extension for identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violati…☆396Updated this week
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,827Feb 25, 2026Updated last week
- i will upload more templates here to share with the comunity.☆567Apr 17, 2024Updated last year
- declutters url lists for crawling/pentesting☆1,532Feb 23, 2025Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,089Aug 14, 2024Updated last year
- Nuclei plugin for BurpSuite☆1,322Oct 22, 2025Updated 4 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,197Oct 6, 2025Updated 5 months ago
- ☆1,116Jul 26, 2023Updated 2 years ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆453Apr 27, 2022Updated 3 years ago