Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files
☆17Jan 26, 2026Updated 2 months ago
Alternatives and similar repositories for secret-detection
Users that are interested in secret-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39May 3, 2021Updated 4 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated 2 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- Important notes for oswe exam prepration. Challenges faces during oswe exam prepration.☆17Jan 14, 2020Updated 6 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆45Dec 7, 2025Updated 4 months ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- ☆14Feb 7, 2022Updated 4 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- My solutions for random crackmes and other challenges☆12Dec 23, 2019Updated 6 years ago
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆42Jan 31, 2026Updated 2 months ago
- Flask API Quickstart with JSON Web Tokens, SQLAlchemy and Pytest☆13Feb 2, 2023Updated 3 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated last year
- ☆10Feb 8, 2021Updated 5 years ago
- A Frida-based utility for dynamically extracting native (.so) libraries from Android applications.☆56Feb 6, 2026Updated 2 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆43Nov 30, 2022Updated 3 years ago
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- Hash Checker Bypass and Process Hacker☆19Nov 14, 2021Updated 4 years ago
- 2 ways of Password Filter DLL to record the plaintext password☆64Apr 17, 2021Updated 5 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66May 24, 2020Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆47Jan 2, 2022Updated 4 years ago
- A public repo to hold some code review challenges for RSA Conference 2022☆11Jun 3, 2022Updated 3 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Jul 8, 2022Updated 3 years ago
- I'm learning Dlang☆12Nov 14, 2023Updated 2 years ago
- To collect and promote FOSS projects started by and contributed to by Vietnamese☆12Sep 24, 2018Updated 7 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- 😎 A curated list of the awesome resources about the security research☆14Updated this week
- THOR APT Scanner User Manual☆20Mar 31, 2026Updated 2 weeks ago