punk-security / secret-magpie
Secret Magpie - Secret Detection Tool
☆214Updated 6 months ago
Alternatives and similar repositories for secret-magpie:
Users that are interested in secret-magpie are comparing it to the libraries listed below
- AWS, Azure, Alibaba and Google bucket scanner☆142Updated last year
- The Internets #1 Subdomain Takeover Tool☆233Updated this week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆391Updated 5 months ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆229Updated last year
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆408Updated this week
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆344Updated last year
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆143Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆214Updated 3 weeks ago
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆231Updated last year
- ☆458Updated 8 months ago
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.☆167Updated 8 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆75Updated 2 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆97Updated 2 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆448Updated 9 months ago
- Search for sensitive data in Postman public library.☆194Updated 2 weeks ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆267Updated 3 months ago
- ☆316Updated this week
- Archive of Potential Insider Threats☆142Updated last year
- Dredging up secrets from the depths of the file system☆118Updated 2 months ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆318Updated 2 weeks ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆186Updated 8 months ago
- Docker toolbox for pentest of web based application.☆144Updated this week
- Discover new target domains using Content Security Policy☆390Updated this week
- ☆102Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆246Updated 2 months ago
- Awesome curate list of cyber security penetration testing tools for Cloud Security mainly AWS/Azure/Google☆118Updated 3 years ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆238Updated 2 years ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆320Updated 2 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆147Updated 4 months ago
- Websec interview questions by tib3rius answered☆305Updated last year