haxshadow / secret_detector
☆11Updated last week
Alternatives and similar repositories for secret_detector:
Users that are interested in secret_detector are comparing it to the libraries listed below
- ☆24Updated last month
- ☆21Updated 7 months ago
- Nafeed-Broken-Link: A Python tool designed to check for broken social media links on a given domain. This script crawls all accessible pa…☆63Updated 8 months ago
- Bug Bounty ultimate tool☆20Updated 5 months ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆51Updated 4 months ago
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆31Updated 3 months ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆71Updated last month
- ☆10Updated 2 years ago
- ☆9Updated 7 months ago
- ☆119Updated last year
- ☆110Updated 3 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆40Updated 9 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆64Updated 11 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆57Updated 2 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆98Updated last month
- ☆105Updated 3 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆113Updated 4 months ago
- A passive way to find backups/ sensitive information.☆77Updated last week
- ☆115Updated 2 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Updated 4 months ago
- ☆41Updated last month
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆13Updated last week
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 9 months ago
- Do bug hunting with One-Line script and get bounty☆17Updated last year
- YesWiki is a wiki system written in PHP. The squelette parameter is vulnerable to path traversal attacks, enabling read access to arbitra…☆12Updated last month
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆46Updated last year
- ☆128Updated last month
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆70Updated 3 months ago
- This script can be used to find html forms in the list of endpoints/urls.☆47Updated last year
- A Bash script for automated nuclei dast scanning by using passive urls☆74Updated 2 months ago