h33tlit / secret-regex-listLinks
List of regex for scraping secret API keys and juicy information.
☆710Updated 3 years ago
Alternatives and similar repositories for secret-regex-list
Users that are interested in secret-regex-list are comparing it to the libraries listed below
Sorting:
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a …☆629Updated last week
- My cheatsheet notes to pentest AWS infrastructure☆684Updated 2 years ago
- BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔☆845Updated 3 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆942Updated last year
- Bugbounty Resources☆543Updated 2 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆880Updated 3 months ago
- Golden Guide☆500Updated last month
- ProjectDiscovery's Open Source Tool Manager☆910Updated 3 months ago
- The most powerful CRLF injection (HTTP Response Splitting) scanner.☆586Updated last year
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆998Updated last month
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆537Updated last year
- Real-world infosec wordlists, updated regularly☆1,549Updated this week
- ☆754Updated last year
- ☆570Updated 2 years ago
- bypass-url-parser☆1,085Updated this week
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆911Updated 4 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,920Updated last year
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆401Updated 7 months ago
- ☆727Updated 3 years ago
- Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests w…☆624Updated 3 weeks ago
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆848Updated 2 years ago
- Small tool to Grab subdomains using Shodan api.☆494Updated last month
- ☆1,118Updated 2 years ago
- Here I gather all the resources about hacking that I find interesting☆270Updated this week
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆705Updated last year
- A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.☆400Updated 8 months ago
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆565Updated 2 months ago
- Awesome cloud enumerator☆1,035Updated 5 months ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆357Updated 2 years ago
- Fast and configurable TLS grabber focused on TLS based data collection.☆1,013Updated last week