Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Gitleaks | 12,895 | 4 days ago | 125 | mit | Go | |||||
Protect and discover secrets using Gitleaks 🔑 | ||||||||||
Trufflehog | 11,287 | 6 | 2 | 2 days ago | 42 | April 28, 2021 | 123 | agpl-3.0 | Go | |
Find and verify credentials | ||||||||||
Infisical | 6,394 | 10 hours ago | 122 | other | TypeScript | |||||
♾ Infisical is an open-source, end-to-end encrypted platform for secret management: sync secrets across your team/infrastructure and prevent secret leaks. | ||||||||||
Valet | 3,854 | 44 | 16 days ago | 43 | June 26, 2020 | 6 | apache-2.0 | Swift | ||
Valet lets you securely store data in the iOS, tvOS, or macOS Keychain without knowing a thing about how the Keychain works. It’s easy. We promise. | ||||||||||
Shhgit | 3,634 | 4 months ago | 14 | February 25, 2021 | 36 | mit | JavaScript | |||
Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories: www.shhgit.com | ||||||||||
Git Secret | 3,229 | 2 days ago | 2 | May 06, 2021 | 88 | mit | Shell | |||
:busts_in_silhouette: A bash-tool to store your private data inside a git repository. | ||||||||||
Secretscanner | 2,627 | 2 days ago | 30 | April 26, 2022 | 18 | mit | Go | |||
:unlock: :unlock: Find secrets and passwords in container images and file systems :unlock: :unlock: | ||||||||||
Bank Vaults | 1,854 | 16 | 2 days ago | 71 | April 05, 2022 | 230 | apache-2.0 | Go | ||
A Vault swiss-army knife: a K8s operator, Go client with automatic token renewal, automatic configuration, multiple unseal options and more. A CLI tool to init, unseal and configure Vault (auth methods, secret engines). Direct secret injection into Pods. | ||||||||||
Subdomainizer | 1,535 | 6 days ago | 2 | mit | Python | |||||
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github. | ||||||||||
C Jwt Cracker | 1,333 | 2 years ago | 10 | mit | C | |||||
JWT brute force cracker written in C |
SubDomainizer is a tool designed to find hidden subdomains and secrets present is either webpage, Github, and external javascripts present in the given URL. This tool also finds S3 buckets, cloudfront URL's and more from those JS files which could be interesting like S3 bucket is open to read/write, or subdomain takeover and similar case for cloudfront. It also scans inside given folder which contains your files.
SubDomainizer can find URL's for following cloud storage services:
1. Amazon AWS services (cloudfront and S3 buckets)
2. Digitalocean spaces
3. Microsoft Azure
4. Google Cloud Services
5. Dreamhost
6. RackCDN.
SubDomainizer will also find secrets present in content of the page and javascripts files. Those secret finding depends on some specific keywords and Shannon Entropy formula. It might be possible that some secrets which searched by tool will be false positive. This secret key searching is in beta and later version might have increased accuracy for search results.
git clone https://github.com/nsonaniya2010/SubDomainizer.git
cd SubDomainizer
pip3 install -r requirements.txt
Use following command to update to latest version:
git pull
Short Form | Long Form | Description |
---|---|---|
-u | --url | URL in which you want to find (sub)domains. |
-l | --listfile | File which contain list of URL's needs to be scanned. |
-o | --output | Output file name in which you need to save the results. |
-c | --cookie | Cookies which needs to be sent with request. |
-h | --help | show the help message and exit. |
-cop | --cloudop | Give file name in which you need to store cloud services results. |
-d | --domains | Give TLD (eg. for www.example.com you have to give example.com) to find subdomain for given TLD seperated by comma (no spaces b/w comma). |
-g | --gitscan | Needed if you want to get things via Github too. |
-gt | --gittoken | Github API token is needed, if want to scan (also needed -g also). |
-gop | --gitsecretop | Saving secrets to a file found in github. |
-k | --nossl | Use this to bypass the verification of SSL certificate. |
-f | --folder | Root folder which contains files/folder. |
-san | --subject_alt_name | Find Subject Alternative Names for all found subdomains, Options: 'all', 'same'. |
python3 SubDomainizer.py -h
python3 SubDomainizer.py -u http://www.example.com
python3 SubDomainizer.py -l list.txt
python3 SubDomainizer.py -u https://www.example.com -o output.txt
python3 SubDomainizer.py -u https://www.example.com -c "test=1; test=2"
python3 SubDomainizer.py -u https://www.example.com -o output.txt -gt <github_token> -g
python3 SubDomainizer.py -u https://www.example.com -o output.txt -gt <github_token> -g -k
python3 SubDomainizer.py -f /path/to/root/folder/having/files/and/folders/ -d example.com -gt <github_token> -g -k
python3 SubDomainizer.py -u https://www.example -san all
python3 SubDomainizer.py -u https://www.example.com -o output.txt -gt <github_token> -g -gop filename_to_save
Results before using facebook cookies in SubDomainizer:
Results after using facebook cookies in SubDomainizer:
In the latest version (2.0) following important features are added:
This tools is licensed under the MIT license. take a look at the LICENSE for information about it.
Want to help if you like features and tools? or Liked this tool? Help Here