🔪 Scan memory for secrets and more. Maybe eventually a full /proc toolkit.
-
Updated
Jul 27, 2022 - Go
🔪 Scan memory for secrets and more. Maybe eventually a full /proc toolkit.
Protect your secrets using Gitleaks-Action
Scan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files. (.apk, .xapk, .dex, .jar, .class, .smali, .zip, .aar, .arsc, .aab, .jadx.kts).
command-line tool designed to rapidly scan decompiled Android applications for hardcoded secrets. It moves beyond simple keyword searching by using a powerful regex engine to identify high-entropy strings, specific key patterns, and other sensitive data that could pose a security risk.
Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for deeper analysis.
A secrets scanner for Confluence - For red teamers and pentesters
A sarcastic list of secret scanners
A blazingly fast secrets scanner with validation capabilities
CLI tool to transform verbose noseyparker JSON reports into concise JSON or CSV summaries for security analysis
GitHub Secrets Scanner Action
A Python based gitleaks wrapped tool to enable scanning of multiple Gitlab repositories in parallel.
An advanced secret scanning tool designed to identify sensitive information, such as API keys and tokens within your given urls.
A Git filter tool that keeps sensitive code local while committing safe alternatives to your repository.
Fast, lightweight secret scanner for Git repos and filesystems (TruffleHog + Gitleaks alternative)
API for scanning open source projects for CVE's , special vulnerabilities and secrets like API keys and passwords.
Multi-layer Git secret scanner using regex + entropy analysis + LLM verification to detect exposed API keys, credentials, and sensitive data in commit history. Built with Python for security auditing and DevSecOps workflows
Add a description, image, and links to the secret-scanner topic page so that developers can more easily learn about it.
To associate your repository with the secret-scanner topic, visit your repo's landing page and select "manage topics."