mazen160 / secrets-patterns-dbLinks
Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.
☆1,176Updated 3 weeks ago
Alternatives and similar repositories for secrets-patterns-db
Users that are interested in secrets-patterns-db are comparing it to the libraries listed below
Sorting:
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,574Updated last year
- Attack surface detector that identifies endpoints by static analysis☆711Updated this week
- Automating situational awareness for cloud penetration tests.☆2,131Updated 3 months ago
- Cloudlist is a tool for listing Assets from multiple Cloud Providers.☆940Updated last week
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆871Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆668Updated this week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆421Updated 5 months ago
- bypass-url-parser☆1,078Updated this week
- Check your WAF before an attacker does☆1,383Updated last month
- ☆293Updated 10 months ago
- OXO is a security scanning orchestrator for the modern age.☆552Updated last week
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆703Updated 8 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆642Updated last year
- A list of open source web security scanners☆1,104Updated last month
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,283Updated 2 months ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆877Updated 2 years ago
- Awesome cloud enumerator☆1,018Updated 3 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆661Updated 2 months ago
- Fast and customizable subdomain wordlist generator using DSL☆821Updated 2 months ago
- 🍪 CookieMonster helps you detect and abuse vulnerable implementations of stateless sessions.☆884Updated 5 months ago
- Navigate the CVE jungle with ease.☆2,029Updated last week
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,356Updated last month
- Unleash the power of cloud☆775Updated 7 months ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆2,097Updated last month
- A utility to detect various technology for a given IP address.☆843Updated this week
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆1,857Updated 8 months ago
- ☆670Updated this week
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,206Updated 5 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆651Updated last year
- Enumerate the permissions associated with AWS credential set☆1,168Updated last year