punk-security / secret-magpie
Secret Magpie - Secret Detection Tool
☆224Updated 9 months ago
Alternatives and similar repositories for secret-magpie:
Users that are interested in secret-magpie are comparing it to the libraries listed below
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆408Updated 3 months ago
- AWS, Azure, Alibaba and Google bucket scanner☆146Updated last year
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆231Updated last year
- ☆481Updated 11 months ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆318Updated 3 months ago
- Search for sensitive data in Postman public library.☆204Updated 3 months ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆689Updated 6 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆218Updated last week
- Collection of offensive tools targeting Microsoft Azure☆206Updated 2 years ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆236Updated last year
- ☆105Updated last year
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆449Updated last year
- Docker toolbox for pentest of web based application.☆150Updated this week
- Distribute ordinary bash commands over many systems☆164Updated 2 years ago
- The Internets #1 Subdomain Takeover Tool☆246Updated 3 months ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆159Updated this week
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆271Updated 7 months ago
- Discover new target domains using Content Security Policy☆418Updated this week
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆187Updated 11 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆163Updated 2 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆347Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆106Updated 5 months ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆409Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆168Updated 2 months ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆179Updated last year
- A OWASP Based Checklist With 80+ Test Cases☆142Updated 2 years ago
- hauditor is a tool designed to analyze the security headers returned by a web page.☆169Updated 9 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆182Updated 7 months ago
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆217Updated 7 months ago
- ☆137Updated 3 years ago