punk-security / secret-magpieLinks
Secret Magpie - Secret Detection Tool
☆232Updated last year
Alternatives and similar repositories for secret-magpie
Users that are interested in secret-magpie are comparing it to the libraries listed below
Sorting:
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆424Updated 5 months ago
- AWS, Azure, Alibaba and Google bucket scanner☆154Updated last year
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆166Updated 2 years ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆233Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆220Updated last month
- Search for sensitive data in Postman public library.☆207Updated 6 months ago
- Docker toolbox for pentest of web based application.☆160Updated this week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆188Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆124Updated 5 months ago
- The Internets #1 Subdomain Takeover Tool☆261Updated last month
- A tool to quickly do keyword searches over Gitlab and Github for OSINT & bug bounty recon☆240Updated last year
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆188Updated 10 months ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆348Updated 2 years ago
- A fast network scanning tool to detect open ports and security vulnerabilities☆114Updated 3 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆247Updated 2 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- Wordlists handcrafted (and automated) with ♥☆218Updated 4 months ago
- A vast collection of security tools and resources curated by the community.☆202Updated last month
- Archive of Potential Insider Threats☆147Updated last year
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆122Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azure☆210Updated 2 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆162Updated 2 months ago
- Dredging up secrets from the depths of the file system☆128Updated 8 months ago
- Nuclei templates for honeypots detection.☆196Updated last year
- ☆491Updated last year
- An uber fast and simple subdomain enumeration tool using DNS and web requests with support for detecting wildcard DNS records.☆176Updated last year
- ☆139Updated 4 years ago
- Crtsh Subdomain Enumeration | This bash script makes it easy to quickly save and parse the output from https://crt.sh website.☆233Updated 10 months ago
- A repository with informtion related to Cloud Osint☆106Updated 3 months ago