Extracting api keys and secrets by requesting each url at the your list.
☆20Jul 5, 2024Updated last year
Alternatives and similar repositories for secretx
Users that are interested in secretx are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool aims at accumulating javascript files from a given set of subdomains to discover hidden endpoints. It swims through JS files to…☆72Dec 28, 2022Updated 3 years ago
- SSRF (Server Side Request Forgery) testing resources☆12Sep 7, 2017Updated 8 years ago
- Template Injection in Email Templates leads to code execution on Jira Service Management Server☆48Sep 9, 2021Updated 4 years ago
- Solutions from @PortSwigger labs☆13Apr 11, 2024Updated last year
- Python script to find URLs that could contain secrets☆13Apr 28, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Nuclei Templates☆14Jan 13, 2023Updated 3 years ago
- CVE-2021-22192 靶场: 未授权用户 RCE 漏洞☆37Jan 24, 2023Updated 3 years ago
- Advanced Sub-domain Enumerator☆10Mar 14, 2020Updated 6 years ago
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Jan 15, 2019Updated 7 years ago
- The program allows to download large data from shodan quickly, simply and avoid errors.☆29Nov 3, 2020Updated 5 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- A fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.☆15Nov 14, 2023Updated 2 years ago
- A multithreaded Python3 program that fuzzes HTTP headers and values and outputs the results to a CSV file.☆21Jan 13, 2019Updated 7 years ago
- Implementation of Wappalyzer in Python☆55Dec 8, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A custom built DNS bruteforcer with multi-threading, and handling of bad resolvers.☆56Apr 25, 2022Updated 3 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- Check whether the domain has a rate limit enabled.☆66Aug 6, 2024Updated last year
- A tool for extract Endpoints, URLs and Secrets from contents☆67Updated this week
- Most powerfull Wifi Jammier.with fixes.☆13Oct 14, 2022Updated 3 years ago
- A tool to find redirection chains in multiple URLs☆78Jan 1, 2025Updated last year
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.☆193Dec 27, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆17Oct 30, 2025Updated 5 months ago
- This script checks the status of URLs to see if they are alive or not.☆13Nov 22, 2024Updated last year
- ☆11Oct 20, 2022Updated 3 years ago
- This python based tool can be used to discover API keys, access tokens, and other sensitive data in JavaScript files. It can scan JavaScr…☆15Oct 18, 2024Updated last year
- ☆13Feb 9, 2022Updated 4 years ago
- GET-ACQ is a python tool used to gather all companies acquired by a given company domain name. It is done by calling SecurityTrails API.☆12Nov 10, 2021Updated 4 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided h…☆11Jun 23, 2023Updated 2 years ago
- The project aims at creating target-specific wordlists for any web application that you are testing.☆66May 28, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Javascript file change monitoring☆17Mar 13, 2026Updated 3 weeks ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 4 months ago
- Pen Hunter is a comprehensive vulnerability scanning tool designed for penetration testers, security researchers and bug bounties. it aut…☆21Dec 10, 2024Updated last year
- List of free and checked http, https, socks4 and socks5 proxies☆19Mar 30, 2026Updated last week
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Simple customer and order management system written especially with photographers in mind☆13Nov 19, 2018Updated 7 years ago