Find and verify credentials
-
Updated
Jun 15, 2023 - Go
Find and verify credentials
A vault for securely storing and accessing AWS credentials in development environments
Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale. Use Ockam to build secure-by-design applications that can Trust Data-in-Motion.
Know the dangers of credential reuse attacks.
Find and fix 360+ types of hardcoded secrets and 70+ types of infrastructure-as-code misconfigurations.
Environment variables meet macOS Keychain and gnome-keyring <3
Nosey Parker is a command-line program that finds secrets and sensitive information in textual data and Git history.
19 Customizable honeypots for monitoring network traffic, bots activities and username\password credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP, RDP, VNC, SMB, SOCKS5, Redis, TELNET, Postgres, MySQL, MSSQL, Elastic and ldap)
An Intelligent wordlist generator based on user profiling, permutations, and statistics. (Named after the same tool in Mr.Robot series S01E01)
The easiest way to access your cloud.
mXtract - Memory Extractor & Analyzer
Identify hardcoded secrets in static structured text
30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)
Private key usage verification
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Add a description, image, and links to the credentials topic page so that developers can more easily learn about it.
To associate your repository with the credentials topic, visit your repo's landing page and select "manage topics."