Scans Slack for API tokens, credentials, passwords, and more using YARA rules
☆40Feb 26, 2021Updated 5 years ago
Alternatives and similar repositories for slacksecrets
Users that are interested in slacksecrets are comparing it to the libraries listed below
Sorting:
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- Search for secrets inside user data attached to EC2 instances on multiple AWS accounts☆16Jun 19, 2024Updated last year
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 4 months ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 5 years ago
- Piper Burp Suite Extender plugin☆16Jan 15, 2026Updated last month
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- ☆30Jun 27, 2022Updated 3 years ago
- Validate proxies for specific domain☆38Aug 14, 2021Updated 4 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Signatures for wraith used to detect secrets across various sources☆15Jul 8, 2022Updated 3 years ago
- Terraform modules for Sumo Logic resources☆16Dec 16, 2025Updated 2 months ago
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- take a list of resolved subdomains and output any corresponding CNAMES en masse.☆18Jan 29, 2026Updated last month
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- VulnBox is a container that is intentionally designed with vulnerabilities to allow security professionals to practice and improve their …☆17Aug 23, 2024Updated last year
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Jan 29, 2019Updated 7 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆23Nov 20, 2022Updated 3 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 3 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 4 years ago
- 🔍 A simple tool to obtain long lists of ips from domains using goroutines☆26Jul 29, 2019Updated 6 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Dec 8, 2022Updated 3 years ago
- ☆20Feb 25, 2022Updated 4 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 4 years ago
- Toggle Burp proxy from anywhere and get its status in i3wm☆23Sep 2, 2024Updated last year
- List HackerOne private program assets☆154Jun 24, 2021Updated 4 years ago
- A collection of scripts to steal BTC from Lightning Network enabled custodial services. Only for educational purpose! Share your findings…☆18Sep 19, 2021Updated 4 years ago
- Python utility to takeover domains vulnerable to AWS NS Takeover☆86Feb 2, 2023Updated 3 years ago
- Bash script to automate Bug Bounty Reconnaissance☆45Jan 3, 2021Updated 5 years ago
- Burp extension to filter JSON on the fly with JQ queries in the HTTP message viewer.☆47Dec 24, 2020Updated 5 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- This is a collection of ZAProxy Automation Tools and scripts to automate security tests of WEB Applications and WEB Sites☆26May 14, 2023Updated 2 years ago
- Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.☆100Jun 17, 2025Updated 8 months ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated last year
- Fast Endpoint Scanner☆55Dec 23, 2020Updated 5 years ago