Scan for Exposed Secrets
Scan HTTP responses for exposed tokens, credentials, and other sensitive information
Vulnerability Scanning
Created by
mhmdiaa-trickest
Last updated
8/12/2024
Scan for Exposed Secrets
Description
Scan HTTP responses for exposed tokens, credentials, and other sensitive information.
Features
- Scans for a wide range of secret patterns.
- Reuses HTTP responses across searches to minimize outgoing requests.
- Can scan thousands of URLs simulataneously.
Inputs
Required
- urls: a list of URLs
Optional
- header: Header(s) to include in HTTP requests
- header-file: File with header(s) to include in HTTP requests
- rate-limit: Maximum number of requests to send per second per machine (default: 300)
Outputs
- findings: JSONLines records of finding details.
Changelog
- v1.0.0
- Initial release
- v1.1.0
- Added
header-file
input
- Added
- v1.2.0
- Added recursive scanning to detect vulnerabilities at every level of the input URL paths