Vulnerability Scanning
Created bymhmdiaa-trickest
Last updated8/12/2024
Scan for Exposed Secrets
Description
Scan HTTP responses for exposed tokens, credentials, and other sensitive information.Features
- Scans for a wide range of secret patterns.
- Reuses HTTP responses across searches to minimize outgoing requests.
- Can scan thousands of URLs simulataneously.
Inputs
Required
- urls: a list of URLs
Optional
- header: Header(s) to include in HTTP requests
- header-file: File with header(s) to include in HTTP requests
- rate-limit: Maximum number of requests to send per second per machine (default: 300)
Outputs
- findings: JSONLines records of finding details.
Changelog
- v1.0.0
- Initial release
- v1.1.0
- Added
header-file
input
- Added
- v1.2.0
- Added recursive scanning to detect vulnerabilities at every level of the input URL paths
- v1.2.1
- Included the HTTP request that triggered each finding in the
request
field of thefindings
output
- Included the HTTP request that triggered each finding in the