h33tlit / secret-regex-listLinks
List of regex for scraping secret API keys and juicy information.
☆723Updated 3 years ago
Alternatives and similar repositories for secret-regex-list
Users that are interested in secret-regex-list are comparing it to the libraries listed below
Sorting:
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a …☆661Updated this week
- Bugbounty Resources☆540Updated 2 years ago
- My cheatsheet notes to pentest AWS infrastructure☆695Updated 3 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆970Updated last year
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆908Updated 6 months ago
- The most powerful CRLF injection (HTTP Response Splitting) scanner.☆590Updated 2 years ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆405Updated 10 months ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆539Updated last year
- BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔☆848Updated 3 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆358Updated 2 years ago
- Dangerously fast DNS/network/port scanner☆921Updated 3 years ago
- ☆572Updated 3 years ago
- ProjectDiscovery's Open Source Tool Manager☆1,002Updated 3 weeks ago
- Golden Guide☆509Updated 4 months ago
- Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests w…☆628Updated 3 weeks ago
- Find subdomains with GPT, for free☆348Updated last year
- bypass-url-parser☆1,104Updated this week
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,059Updated 3 months ago
- jsleak is a tool to find secret , paths or links in the source code during the recon.☆566Updated 2 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,931Updated 2 years ago
- ☆757Updated last year
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆571Updated last week
- ☆225Updated 4 years ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆452Updated 3 years ago
- Here I gather all the resources about hacking that I find interesting☆273Updated last week
- Awesome cloud enumerator☆1,065Updated 9 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆731Updated last year
- Real-world infosec wordlists, updated regularly☆1,595Updated last week
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆916Updated 3 weeks ago
- 「🔑」A tool used to hunt down API key leaks in JS files and pages☆803Updated 3 months ago