Find credentials all over the place
-
Updated
Mar 6, 2023 - Go
Find credentials all over the place
A vault for securely storing and accessing AWS credentials in development environments
Build secure-by-design applications that can trust all data-in-motion. Orchestrate end-to-end encryption, mutual authentication, key management, credential management & authorization policy enforcement — at scale.
Know the dangers of credential reuse attacks.
Find and fix 350+ types of hardcoded secrets and 70+ types of infrastructure-as-code misconfigurations.
Environment variables meet macOS Keychain and gnome-keyring <3
Nosey Parker is a command-line program that finds secrets and sensitive information in textual data and Git history.
mXtract - Memory Extractor & Analyzer
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
The easiest way to access your cloud.
Identify hardcoded secrets in static structured text
Private key usage verification
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
Add a description, image, and links to the credentials topic page so that developers can more easily learn about it.
To associate your repository with the credentials topic, visit your repo's landing page and select "manage topics."