A fast and powerful CLI tool for finding secrets and other data in files, web pages, and other text sources. Supports multi-threading and advanced pattern matching.
☆21Mar 20, 2026Updated this week
Alternatives and similar repositories for SecretHound
Users that are interested in SecretHound are comparing it to the libraries listed below
Sorting:
- Human-like cursor movement generator using a self-trained ONNX model. Simulates real mouse trajectories for testing, UI automation, or re…☆25Jan 16, 2026Updated 2 months ago
- bind your malware or reverse shell into any file (jpg - jpeg - txt - mp4 or any format ;) )☆10Mar 26, 2019Updated 6 years ago
- CyberStrikeAI is an AI-native security testing platform built in Go. It integrates 100+ security tools, an intelligent orchestration engi…☆36Mar 10, 2026Updated last week
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 5 months ago
- An simple crypter made with Xanthorox AI for Testing v5 pro capabilities☆40Feb 11, 2026Updated last month
- ClickForClickOnce - Generate configurable clickonce payloads☆92Oct 10, 2025Updated 5 months ago
- sideloading PoC using onedrive.exe & version.dll☆93Oct 30, 2025Updated 4 months ago
- A tus server integration for Rocket framework☆14Sep 9, 2024Updated last year
- MacOS Stealer written in Rust. For Legal and Ethical Research Purposes Only.☆25Jan 3, 2025Updated last year
- ☆81Feb 12, 2026Updated last month
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆115Mar 6, 2026Updated 2 weeks ago
- Fast, memory-efficient attention column reduction (e.g., sum, mean, max)☆42Feb 10, 2026Updated last month
- Plugin for NOPing instructions in IDA☆21May 9, 2024Updated last year
- A Python script to download files from Telegram entities (channels, groups, chats, or saved messages). It supports filtering by file type…☆33Nov 13, 2025Updated 4 months ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆58Jan 17, 2026Updated 2 months ago
- This is the word list for fuzzing kubernetes.☆15Nov 11, 2023Updated 2 years ago
- ☆14Oct 31, 2024Updated last year
- Implementação do Pattern Arquitetural Pub/Sub em TypeScript para o Código Fonte TV☆10Aug 7, 2024Updated last year
- 域名接管漏洞,批量检测工具☆11Oct 29, 2020Updated 5 years ago
- This is simple Deno && Node Js packages that download form common social media sites☆13Nov 22, 2022Updated 3 years ago
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated last month
- A Proof-of-Concept using Cache Smuggling + Exif data to passively download a second stage payload☆51Oct 28, 2025Updated 4 months ago
- ☆76Jan 1, 2026Updated 2 months ago
- This is the implementation of the 5G-AKA for the master thesis: Identity management, identification mechanisms and privacy protection met…☆11Jul 22, 2019Updated 6 years ago
- BEST HACKING TOOLS..For more tools visit our blog for Hackers☆25Oct 1, 2025Updated 5 months ago
- the POC of package.json RCE☆26Jun 24, 2025Updated 8 months ago
- A TypeScript example showcasing the integration of Ollama with the Model Context Protocol (MCP) servers. This project provides an interac…☆29Aug 21, 2025Updated 7 months ago
- MCP server that connects AI assistants to HackerOne for bug bounty hunting☆203Mar 11, 2026Updated last week
- A tool that allows you to extract a client-specific wordlist from the LDAP of an Active Directory.☆58Jul 2, 2025Updated 8 months ago
- ☆17Jun 10, 2023Updated 2 years ago
- An http2 stack living on top of scapy☆11Oct 24, 2018Updated 7 years ago
- LBM solver written in Zig☆12Nov 13, 2024Updated last year
- ☆18Jan 16, 2025Updated last year
- 一个教你如何Review的学习平台☆17Oct 20, 2022Updated 3 years ago
- Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis (IEEE S&P 2024)☆15Oct 3, 2024Updated last year
- ☆18Nov 6, 2024Updated last year
- Revisiting Cache Side-Channel Attacks in Deep Neural Networks Executables☆13Aug 27, 2024Updated last year