trufflesecurity / trufflehog
Find, verify, and analyze leaked credentials
β18,100Updated this week
Alternatives and similar repositories for trufflehog:
Users that are interested in trufflehog are comparing it to the libraries listed below
- Find secrets with Gitleaks πβ18,920Updated this week
- Reconnaissance tool for GitHub organizationsβ5,984Updated 2 years ago
- Fast web fuzzer written in Goβ13,421Updated 7 months ago
- In-depth attack surface mapping and asset discoveryβ12,468Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enablβ¦β22,165Updated this week
- A vulnerability scanner for container images and filesystemsβ9,369Updated this week
- A next-generation crawling and spidering framework.β13,026Updated last week
- Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.β11,116Updated this week
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.β3,864Updated last year
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and moreβ24,689Updated this week
- Fast passive subdomain enumeration tool.β11,141Updated last week
- An enterprise friendly way of detecting and preventing secrets in code.β3,931Updated last week
- Directory/File, DNS and VHost busting tool written in Goβ10,912Updated this week
- Open Source Vulnerability Management Platformβ5,192Updated 2 weeks ago
- httpx is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library.β8,109Updated last week
- A pretty sweet vulnerability scannerβ4,105Updated 4 months ago
- The recursive internet scanner for hackers. π§‘β7,811Updated this week
- An HTTP toolkit for security research.β6,195Updated last week
- π₯ Web-application firewalls (WAFs) from security standpoint.β6,486Updated 3 months ago
- Vulnerability Static Analysis for Containersβ10,503Updated this week
- "Can I take over XYZ?" β a list of services and how to claim (sub)domains with dangling DNS records.β5,022Updated last week
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.β5,154Updated 3 months ago
- Prowler is an Open Cloud Security tool for AWS, Azure, GCP and Kubernetes. It helps for continuos monitoring, security assessments and auβ¦β11,232Updated this week
- A fast, simple, recursive content discovery tool written in Rust.β6,229Updated last week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β12,385Updated 3 weeks ago
- CLI tool and library for generating a Software Bill of Materials from container images and filesystemsβ6,583Updated this week
- The ZAP by Checkmarx Core projectβ13,069Updated this week
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysisβ30,227Updated this week
- Open-Source Phishing Toolkitβ12,165Updated 4 months ago
- The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in productioβ¦β9,267Updated 3 months ago