h33tlit / secret-regex-listLinks
List of regex for scraping secret API keys and juicy information.
☆721Updated 3 years ago
Alternatives and similar repositories for secret-regex-list
Users that are interested in secret-regex-list are comparing it to the libraries listed below
Sorting:
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a …☆670Updated last month
- My cheatsheet notes to pentest AWS infrastructure☆700Updated 3 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆971Updated 2 years ago
- Bugbounty Resources☆539Updated 2 years ago
- bypass-url-parser☆1,109Updated this week
- BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔☆851Updated 3 years ago
- The most powerful CRLF injection (HTTP Response Splitting) scanner.☆592Updated 2 years ago
- Golden Guide☆510Updated 6 months ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆920Updated 8 months ago
- ProjectDiscovery's Open Source Tool Manager☆1,042Updated 2 weeks ago
- Dangerously fast DNS/network/port scanner☆919Updated 3 years ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆917Updated 2 months ago
- ☆571Updated 3 years ago
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and…☆800Updated 2 years ago
- Find subdomains with GPT, for free☆350Updated last year
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆538Updated last year
- ☆757Updated last year
- Web Cache Vulnerability Scanner is a Go-based CLI tool for testing for web cache poisoning. It is developed by Hackmanit GmbH (http://hac…☆1,070Updated 4 months ago
- Simple python script supported with BurpBouty profile that helps you to detect SQL injection "Error based" by sending multiple requests w…☆630Updated 2 weeks ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,935Updated 2 years ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆406Updated 11 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆730Updated last year
- Awesome cloud enumerator☆1,085Updated 10 months ago
- Real-world infosec wordlists, updated regularly☆1,611Updated last week
- Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found☆341Updated 2 years ago
- Here I gather all the resources about hacking that I find interesting☆271Updated this week
- ☆1,117Updated 2 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆358Updated 2 years ago
- Golang client for querying SecurityTrails API data☆578Updated 2 years ago
- Automated Recon for Pentesting & Bug Bounty☆431Updated 2 months ago