☆18Apr 26, 2025Updated 11 months ago
Alternatives and similar repositories for secret_detector
Users that are interested in secret_detector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bug Bounty ultimate tool☆28Dec 3, 2025Updated 4 months ago
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆19Mar 26, 2025Updated last year
- Nuclei templates to run on urls☆18Sep 14, 2023Updated 2 years ago
- Web Application Penetration Testing Methodology☆53Nov 12, 2025Updated 5 months ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Pler - Domain Probe and Cloudflare Filter Tool. Pler is a simple yet powerful Python script to check whether a domain is using Cloudflare…☆22Aug 12, 2025Updated 8 months ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆27Aug 2, 2025Updated 8 months ago
- A fast and efficient subdomain hijacking scanner that checks for takeover vulnerabilities by matching HTTP response bodies against predef…☆29Dec 21, 2025Updated 3 months ago
- Google Dork Scanner for Google Chrome Extension☆17May 10, 2025Updated 11 months ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆86Mar 20, 2025Updated last year
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆17Dec 26, 2025Updated 3 months ago
- In Detail Methodology of How I perform Web Pentesting☆10Oct 18, 2025Updated 5 months ago
- Writeup Template. Feel free to replicate but please give me credit!☆13Nov 7, 2025Updated 5 months ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- ☆11Jun 4, 2021Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 3 years ago
- To run Burpsuite from launcher, You may run it in terminal by script, But by this tool you will able to run it from Launcher with a Burp …☆11Sep 24, 2023Updated 2 years ago
- ☆275Dec 6, 2025Updated 4 months ago
- All kind of frida stuff when needed in pentesting or reverse engineering of an android app - The perfect starter kit☆18Jun 2, 2020Updated 5 years ago
- My software engineering notes.☆24Nov 12, 2025Updated 5 months ago
- FileFetcher is a Python tool that extracts and filters URLs from archived Wayback Machine data based on file types like .pdf, .zip, .sql,…☆20Jan 16, 2025Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- URLs for Exploit (UFX) is a powerful, modular, and extensible tool designed for security researchers, penetration testers, and developers…☆17Jan 30, 2025Updated last year
- A curation of awesome portfolio website ideas for developers and designers to draw inspiration from. Raise a pull request to add more. 💜…☆12Apr 10, 2025Updated last year
- This repository contains a proof-of-concept exploit script for CVE-2025-32432, a pre-authentication Remote Code Execution (RCE) vulnerabi…☆24Apr 27, 2025Updated 11 months ago
- A collection of CTF frameworks, libraries, resources, softwares and tutorials, books, resources and cool stuff in Cybersecurity☆17Dec 11, 2021Updated 4 years ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated last year
- Gampung tools for find nuclei template from github☆12Sep 6, 2023Updated 2 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- A multi-threaded port scanner implementation in Python☆12May 30, 2023Updated 2 years ago
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13Oct 12, 2022Updated 3 years ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated 2 years ago
- InstaReport v4.3.1 — Premium social media auto-report, ban & unban tool. One-click mass reporting for Instagram, Twitter/X, Threads & Sna…☆52Mar 28, 2026Updated 2 weeks ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 3 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆12Feb 1, 2023Updated 3 years ago
- Modular Buffer Overflow Fuzzer and Exploitation Tool☆10Aug 28, 2019Updated 6 years ago
- ☆13Nov 17, 2021Updated 4 years ago