how to look for Leaked Credentials !
☆1,048May 6, 2024Updated 2 years ago
Alternatives and similar repositories for Leaked-Credentials
Users that are interested in Leaked-Credentials are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,471Feb 10, 2024Updated 2 years ago
- ☆880Dec 26, 2025Updated 4 months ago
- De-clutter a list of URLs☆387Mar 8, 2026Updated 2 months ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆502Jun 28, 2025Updated 10 months ago
- My Priv8 Nuclei Templates☆340May 12, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,625Mar 8, 2026Updated 2 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,985Oct 4, 2025Updated 7 months ago
- An IIS short filename enumeration tool☆1,153Nov 25, 2024Updated last year
- NucleiFuzzer is a robust automation tool that efficiently detects web application vulnerabilities, including XSS, SQLi, SSRF, and Open Re…☆1,838Apr 17, 2026Updated 3 weeks ago
- A browser extension that allows you to monitor, intercept, and debug JavaScript sinks based on customizable configurations.☆792Dec 9, 2025Updated 4 months ago
- Nuclei Templates Collection☆1,131Dec 25, 2025Updated 4 months ago
- AI-powered ffuf wrapper☆772Dec 4, 2025Updated 5 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆753Jan 25, 2026Updated 3 months ago
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆562Mar 8, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Rockyou for web fuzzing☆3,141Mar 11, 2026Updated last month
- 1337 Wordlists for Bug Bounty Hunting☆956May 1, 2026Updated last week
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆939Aug 24, 2023Updated 2 years ago
- i will upload more templates here to share with the comunity.☆569Apr 17, 2024Updated 2 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,512Jan 8, 2026Updated 4 months ago
- Top disclosed reports from HackerOne☆5,895Apr 25, 2026Updated last week
- All about bug bounty (bypasses, payloads, and etc)☆6,722Sep 8, 2023Updated 2 years ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,472Jul 14, 2025Updated 9 months ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,824May 22, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A repository that includes all the important wordlists used while bug hunting.☆1,400Mar 11, 2023Updated 3 years ago
- ☆188Mar 14, 2026Updated last month
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆286Mar 6, 2026Updated 2 months ago
- Collection of methodology and test case for various web vulnerabilities.☆7,106Jun 25, 2025Updated 10 months ago
- Hidden parameters discovery suite☆2,052Sep 8, 2024Updated last year
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,546Mar 8, 2026Updated 2 months ago
- 40,000+ Nuclei templates for security scanning and detection across diverse web applications and services☆350Jan 7, 2024Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,197Aug 14, 2024Updated last year
- These are my checklists which I use during my hunting.☆862Nov 30, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An insane list of all dorks taken from everywhere from various different sources.☆805Dec 29, 2025Updated 4 months ago
- ☆594Aug 14, 2025Updated 8 months ago
- declutters url lists for crawling/pentesting☆1,554Feb 23, 2025Updated last year
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆845Mar 24, 2026Updated last month
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,606Apr 12, 2026Updated 3 weeks ago
- Fast and customizable subdomain wordlist generator using DSL☆947Feb 5, 2026Updated 3 months ago
- MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.☆300Oct 5, 2024Updated last year