A suite of secret scanners built in Rust for performance. Based on TruffleHog (https://github.com/dxa4481/truffleHog) which is written in Python.
☆547Jun 28, 2025Updated 10 months ago
Alternatives and similar repositories for rusty-hog
Users that are interested in rusty-hog are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast GitHub recon tool. Scans for leaked secrets across all of GitHub, not just known repos and orgs. Support for GitHub dorks.☆1,415Feb 10, 2026Updated 3 months ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆158Nov 24, 2023Updated 2 years ago
- Benchmarking repo for secrets scanning☆245Aug 18, 2024Updated last year
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago
- qsfuzz (Query String Fuzz) allows you to build your own rules to fuzz query strings and easily identify vulnerabilities.☆302Feb 12, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An enterprise friendly way of detecting and preventing secrets in code.☆4,497Apr 2, 2026Updated last month
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Pluggable linting tool to prevent committing credential.☆1,388Updated this week
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆563Mar 8, 2025Updated last year
- Service-Now Article Bruteforcer☆16Jun 5, 2020Updated 5 years ago
- Detect secrets in your request/response using secretlint.☆56Apr 29, 2026Updated last week
- IIS shortname scanner written in Go☆355Mar 25, 2023Updated 3 years ago
- Awesome cloud enumerator☆1,121Mar 9, 2025Updated last year
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆96Jan 2, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Find, verify, and analyze leaked credentials☆26,084Updated this week
- ☆172Aug 9, 2025Updated 9 months ago
- Related subdomains finder☆28May 18, 2022Updated 3 years ago
- FestIn - Open S3 Bucket Scanner☆230Dec 4, 2020Updated 5 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆73Feb 16, 2019Updated 7 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- List of periodically validated public DNS resolvers☆236Updated this week
- Unpack a JavaScript Source Map back into filesystem structure☆186Oct 9, 2020Updated 5 years ago
- Smart ssrf scanner using different methods like parameter brute forcing in post and get...☆278Feb 11, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- DNSGen is a powerful and flexible DNS name permutation tool designed for security researchers and penetration testers. It generates intel…☆1,067Jan 3, 2025Updated last year
- Rust-based high performance domain permutation generator.☆299Dec 2, 2023Updated 2 years ago
- differer finds how URLs are parsed by different languages in order to help bug hunters break filters☆62May 3, 2020Updated 6 years ago
- Fresh DNS servers☆85Feb 8, 2026Updated 3 months ago
- commonspeak2 subdomains wordlist generated daily **DEPRECATED** The author(s) of commonspeak2 maintain an official repo with more lists. …☆40May 21, 2021Updated 4 years ago
- Extract relative urls from a heap snapshot☆87May 30, 2021Updated 4 years ago
- Secret and/or credential patterns used for gf.☆244Feb 10, 2023Updated 3 years ago
- tool that generates bypasses for open redirects☆51Apr 18, 2022Updated 4 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Dec 15, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- Declutters URLs in a fast and flexible way, for improving input for web hacking automations such as crawlers and vulnerability scans.☆59Jan 22, 2023Updated 3 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,210Aug 14, 2024Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆245Jul 31, 2024Updated last year
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆1,444Aug 6, 2025Updated 9 months ago
- Hidden parameters discovery suite☆2,052Sep 8, 2024Updated last year