LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and easy to add checks for new services.
☆377Dec 5, 2023Updated 2 years ago
Alternatives and similar repositories for LEAKEY
Users that are interested in LEAKEY are comparing it to the libraries listed below
Sorting:
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Shodan Dorks 2023☆245Jan 13, 2025Updated last year
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆937Aug 24, 2023Updated 2 years ago
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆311Mar 31, 2024Updated last year
- Nuclei templates for honeypots detection.☆196Nov 7, 2023Updated 2 years ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆313May 16, 2024Updated last year
- A command-line utility for performing reverse DNS lookups☆73Aug 10, 2023Updated 2 years ago
- A Lightning-Fast DNS Resolver written in Rust 🦀☆69Nov 19, 2024Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- The goal of this guide is very simple - to teach anyone interested in cyber security, regardless of their knowledge level, how to make th…☆835Jun 27, 2025Updated 8 months ago
- A Powerful Sensor Tool to discover login panels, and POST Form SQLi Scanning☆523Jul 5, 2023Updated 2 years ago
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆369May 22, 2023Updated 2 years ago
- Open-source security research tool for identifying origin IP exposure of websites protected by Cloudflare and similar reverse proxy servi…☆2,104Jan 6, 2026Updated last month
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆729Jan 25, 2026Updated last month
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated 11 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- De-clutter a list of URLs☆386Feb 3, 2026Updated last month
- Network Security Sniffer☆840Jan 2, 2026Updated 2 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆732Mar 21, 2024Updated last year
- a simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others☆85Nov 22, 2023Updated 2 years ago
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- 📲 Apepe is a project developed to help to capture informations from a Android app through his APK file. It can be used to extract the co…☆140Oct 15, 2025Updated 4 months ago
- Discover hidden debugging parameters and uncover web application secrets☆247Feb 4, 2026Updated 3 weeks ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆300Sep 8, 2023Updated 2 years ago
- Search for documents in a domain through Search Engines (Google, Bing and Baidu). The objective is to extract metadata☆218Jan 19, 2024Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 8 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆787Jan 9, 2025Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆128Dec 23, 2025Updated 2 months ago
- ☆418Jan 13, 2026Updated last month
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆540Feb 7, 2024Updated 2 years ago
- Self-hosted passive subdomain continous monitoring tool.☆171Jan 30, 2024Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆438Dec 30, 2025Updated 2 months ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆447Jan 25, 2024Updated 2 years ago
- ☆522Apr 29, 2024Updated last year
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91May 18, 2025Updated 9 months ago
- Smart context-based SSRF vulnerability scanner.☆360May 5, 2022Updated 3 years ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆152May 17, 2024Updated last year
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆262Jul 6, 2025Updated 7 months ago