#
credentials
Here are 310 public repositories matching this topic...
A vault for securely storing and accessing AWS credentials in development environments
-
Updated
Jul 20, 2022 - Go
Know the dangers of credential reuse attacks.
credentials
hacking
pentesting
stealth
leak
leaks
hacking-tool
haveibeenpwned
haveibeenpwnd
hacked-emails
credential-reuse-attacks
-
Updated
Mar 28, 2019 - Python
Environment variables meet macOS Keychain and gnome-keyring <3
-
Updated
May 12, 2022 - C
electron
javascript
desktop-app
windows
macos
linux
security
cryptography
privacy
encryption
credentials
cipher
password-manager
desktop
password
privacy-tools
-
Updated
Jul 21, 2022 - JavaScript
mXtract - Memory Extractor & Analyzer
linux
security
c-plus-plus
credentials
cpp
regex
malware
cpp11
memory-hacking
pentesting
exploitation
security-tools
stealing
redteam
-
Updated
Nov 9, 2021 - C++
nodejs
hashing
api
cli
security
credentials
universal
verification
password
hash-functions
pbkdf2
secure
bcrypt
brute-force
unified
argon
rainbow-table
timing-attacks
credential
upash
-
Updated
Apr 28, 2021 - JavaScript
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
emulator
monitoring
credentials
network
proxy
honeypot
scan
chameleon
threat-hunting
honeypots
low-interaction
grafana-interface
-
Updated
Apr 18, 2022 - Dockerfile
nodejs
encryption
credentials
password-manager
password
password-vault
passwords
datasource
password-store
hacktoberfest
buttercup
nodejs-password-vault
-
Updated
Jul 29, 2022 - TypeScript
An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
linux
screenshot
credentials
bruteforce
brute-force
pentesting
cracker
passwords
hacking-tool
password-cracker
cupp
elliot
common-passwords
-
Updated
Jul 29, 2021 - Python
Identify hardcoded secrets in static structured text
lint
security
parser
credentials
pipeline
linter
secrets
json-parser
secrets-scan
yaml-parser
xml-parser
passwords
structured-data
structured-text
leaks
devsecops
hardcoded
security-compliance
secrets-detection
-
Updated
Jul 13, 2022 - Python
Private key usage verification
-
Updated
Nov 9, 2021 - Go
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
-
Updated
Jan 21, 2019 - Python
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
-
Updated
Mar 31, 2021 - PowerShell
chrnorm
commented
Apr 22, 2022
From the Common Fate Community Slack:
We’re getting this error when trying to use aws ssm start-session - I couldn’t see anything online but now I’m reading Brian’s comment above is this something to do with the way granted is storing credentials? Is the SSM session manager plugin not compatible or something?
----------ERROR------- Encountered error while initiating handshake. KM
good first issue
Good for newcomers
Generate credentials for Opera's "browser VPN"
-
Updated
Dec 22, 2017 - Python
Another LSASS dumping tool that uses a dynamically compiled LSA plugin to grab an lsass handle and API hooking for capturing the dump in memory
-
Updated
Mar 18, 2021 - C#
25 different honeypots in a single pypi package! (dns, ftp, httpproxy, http, https, imap, mysql, pop3, postgres, redis, smb, smtp, socks5, ssh, telnet, vnc, mssql, elastic, ldap, ntp, memcache, snmp, oracle, sip and irc)
python
emulator
credentials
honeypot
pypi
twisted
malware-analysis
network-analysis
monitoring-tool
honeypots
pypi-package
-
Updated
Jun 12, 2022 - Python
PowerShell module for KeePass
automation
credentials
powershell
management
keepass
impersonate
changelog-poshkeepass
pskeepass
poshkeepass
posh-keepass
masterkey
credential
-
Updated
Jan 18, 2020 - PowerShell
Create a QR code with your Wi-Fi login details
cli
golang
utility
terminal
credentials
qrcode
wifi
cli-app
command-line-tool
qr-generator
qr
qrcode-generator
wifi-password
cli-tool
-
Updated
Jul 9, 2022 - Go
A Github scanning tool that identifies hardcoded credentials while filtering the false positive data through machine learning models 🔒
-
Updated
Jul 28, 2022 - Python
Passwords Recovery Tool
credentials
secrets
pentesting
passwords
pentest
password-retrieval
redteaming
redteam
password-recovery
credentials-gathering
-
Updated
Feb 3, 2021 - C
This is an ESP32 (including ESP32-S2 and ESP32-C3) / ESP8266 WiFi Connection Manager, using ESPAsyncWebServer, with fallback web configuration portal. Use this library for configuring ESP32, ESP8266 modules' WiFi, etc. Credentials at runtime. You can also specify static DNS servers, personalized HostName, fixed or random AP WiFi channel. With examples supporting ArduinoJson 6.0.0+ as well as 5.13.5- .
mqtt
esp8266
credentials
async
dhcp
esp32
wifi
hostname
wifimanager
web-portal
wifi-credentials
staticip
esp-wifimanager
config-portal
dhcp-hostname
support-arduinojson
esp32-s2
espasync-wifimanager
esp32-c3
esp32-s3
-
Updated
Mar 13, 2022 - C++
Deadshot is a Github pull request scanner to identify sensitive data being committed to a repository
github
git
security
automation
credentials
secrets
pull-requests
vulnerabilities
scanning
sensitive-data-security
sensitive-data
-
Updated
Jan 31, 2022 - Python
A CloudFormation custom resource provider for deploying secrets and keys
-
Updated
Jul 11, 2022 - Python
Improve this page
Add a description, image, and links to the credentials topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the credentials topic, visit your repo's landing page and select "manage topics."


GitGuardian Shield Version
Command executed
ggshield secret scan pre-receiveDescribe the bug
When ggshield is used in pre-receive mode, ggshield cache should be skipped as it's not actionable after. This can also avoid trying to save on a read-only file-system.
Expected behavior
ggshield secret scan pre-receiveshould not save its cache.Technic