command-line tool designed to rapidly scan decompiled Android applications for hardcoded secrets. It moves beyond simple keyword searching by using a powerful regex engine to identify high-entropy strings, specific key patterns, and other sensitive data that could pose a security risk.
☆42Aug 5, 2025Updated 7 months ago
Alternatives and similar repositories for secret-finder
Users that are interested in secret-finder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- FileFetcher is a Python tool that extracts and filters URLs from archived Wayback Machine data based on file types like .pdf, .zip, .sql,…☆19Jan 16, 2025Updated last year
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Oct 30, 2024Updated last year
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆17Oct 30, 2025Updated 5 months ago
- A collection of custom built scripts to exploit known vulnerability chains☆25Jul 23, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆19Feb 14, 2022Updated 4 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- Werkzeug password cracker☆19Nov 14, 2024Updated last year
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆43Dec 4, 2025Updated 3 months ago
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- Find secrets on any machine from over 120 Different Signatures.☆48Aug 16, 2024Updated last year
- Triangulate position based on cell towers position and signal strength☆20Apr 8, 2015Updated 10 years ago
- ☆11Oct 30, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Jan 17, 2024Updated 2 years ago
- ☆15May 8, 2025Updated 10 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆18May 19, 2024Updated last year
- Bypass Android Do Not Disturb using the People and Conversations system☆11May 12, 2023Updated 2 years ago
- This tool aims at accumulating javascript files from a given set of subdomains to discover hidden endpoints. It swims through JS files to…☆71Dec 28, 2022Updated 3 years ago
- All Items Related to bug bounty☆13Aug 8, 2025Updated 7 months ago
- ☆15Feb 6, 2025Updated last year
- mGB - Nintendo Gameboy MIDI control for Arduinoboy☆14Jan 18, 2021Updated 5 years ago
- ☆11Jun 30, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- It's me!! So cute!!!☆15Mar 13, 2026Updated 2 weeks ago
- ACVPatcher patches AndroidManifest and rewrites DEX files inside an APK not touching resources (unlike apktool)☆12Mar 1, 2026Updated 3 weeks ago
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last month
- ☆20May 25, 2025Updated 10 months ago
- Trophy list of zero-day vulnerabilities that I discovered☆11May 6, 2024Updated last year
- DEFCON 30 Car Hacking Village Presentation☆11Sep 11, 2022Updated 3 years ago
- Mannu Shell is PHP web based shell. This code is meant for performing server side file manipulation and other stuffs. Its backdoor free a…☆17Jun 27, 2018Updated 7 years ago
- 一个用于检测HOST 头攻击漏洞的Burp Suite扩展插件。☆13Mar 7, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- Archive for acez.re blog.☆21Apr 17, 2023Updated 2 years ago
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆48Mar 23, 2023Updated 3 years ago
- Get a reverse shell using PostgreSQL☆21Aug 16, 2024Updated last year
- Here you can find writeups from various CTFs that I've participated in.☆12Jul 30, 2023Updated 2 years ago
- ☆172Sep 20, 2024Updated last year
- Este repositório é uma curadoria de perfis, grupos e sites com empregos e estágios remotos encontrados na internet. O objetivo é centrali…☆46Feb 17, 2026Updated last month