command-line tool designed to rapidly scan decompiled Android applications for hardcoded secrets. It moves beyond simple keyword searching by using a powerful regex engine to identify high-entropy strings, specific key patterns, and other sensitive data that could pose a security risk.
☆44Aug 5, 2025Updated 9 months ago
Alternatives and similar repositories for secret-finder
Users that are interested in secret-finder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Check given number is registered on sites like Paytm, PhonePe, Swiggy, Zomato, Amazon, Flipkart etc...[its a v1, will add more sites soon…☆21Oct 5, 2025Updated 7 months ago
- My Personal bot that helps me manage Google Meet Links,List, notes etc☆10Apr 15, 2022Updated 4 years ago
- FileFetcher is a Python tool that extracts and filters URLs from archived Wayback Machine data based on file types like .pdf, .zip, .sql,…☆20Jan 16, 2025Updated last year
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Oct 30, 2024Updated last year
- List of custom Nuclei templates☆16Nov 4, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- OpenRedirector is a powerful automation tool for detecting Open Redirect vulnerabilities in web applications☆18Oct 30, 2025Updated 6 months ago
- 「📖」Tool created to extract metadata from a domain☆14Dec 7, 2024Updated last year
- ☆19Feb 14, 2022Updated 4 years ago
- A collection of custom built scripts to exploit known vulnerability chains☆27Jul 23, 2021Updated 4 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- Werkzeug password cracker☆20Nov 14, 2024Updated last year
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆44Dec 4, 2025Updated 5 months ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆13Aug 7, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- ☆11Apr 15, 2026Updated 3 weeks ago
- PASSWORDS, NED! IN AN OPEN FIEEEELD!!☆21Jan 17, 2024Updated 2 years ago
- ☆15May 8, 2025Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated last year
- This tool aims at accumulating javascript files from a given set of subdomains to discover hidden endpoints. It swims through JS files to…☆72Dec 28, 2022Updated 3 years ago
- A npm package to get all the recognized places of india including pincode☆10Jul 28, 2022Updated 3 years ago
- ☆15Feb 6, 2025Updated last year
- All Items Related to bug bounty☆13Aug 8, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- NES emulator written in python☆11Sep 9, 2024Updated last year
- ☆11Jun 30, 2025Updated 10 months ago
- Fast AEM scope gathering tool for all your public and private BugCrowd Programs☆10Jul 14, 2021Updated 4 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- ACVPatcher patches AndroidManifest and rewrites DEX files inside an APK not touching resources (unlike apktool)☆12Mar 1, 2026Updated 2 months ago
- CVE-2014-10069☆11Jan 7, 2018Updated 8 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- The Super Vulnerable Java Application (SVJA), as demonstrated in the Roniel and DaRon Podcast Show, is an Apache Struts application desig…☆13Jan 1, 2026Updated 4 months ago
- ☆20May 25, 2025Updated 11 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Trophy list of zero-day vulnerabilities that I discovered☆13May 6, 2024Updated 2 years ago
- DEFCON 30 Car Hacking Village Presentation☆11Sep 11, 2022Updated 3 years ago
- A data pool-aware static analyzer to detect cross-layer threats in Android apps.☆12Jan 31, 2024Updated 2 years ago
- 一个用于检测HOST 头攻击漏洞的Burp Suite扩展插件。☆13Mar 7, 2025Updated last year
- ☆15Mar 22, 2021Updated 5 years ago
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆49Mar 23, 2023Updated 3 years ago