Skip to content

find credentials and sensitive data (e.g. access tokens, api keys, passwords, ...) on websites

License

Notifications You must be signed in to change notification settings

PAST2212/credentialthreat

Repository files navigation

credentialthreat

find leaked credentials and sensitive data (e.g. tokens, api keys, ...) on URLs / Host Names, Subdomains, Javascript Files based on a single Domain as input

Current Version 1.00

Features

Key Features

  • Subdomain Scan
  • (Internal) URL / Javascript File / Network File Scan
  • Multiprocessing based on cpu cores
  • DDOS Prevention Instruments (e.g. time delays)
  • Scan up to 100.000 URLs / Network Files based on a single domain
  • Making automatically get request retries (up to 3 times) in case of failing url get request

CSV Output Columns

Example Screenshot: Illustration of csv file and scanned sensitive data candidates image

Instructions

How to install:

How to run:

  • "python3 credentialthreat.py"

How to update:

  • cd credentialthreat

  • git pull

  • In case of a Merge Error: Try "git reset --hard" before "git pull"

    ==> Make sure to make a backup of your userdata folder before update

Before the first run - How it Works:

  • Put your root domain(s) you want to scan into this TXT file "credentialthreat/data/input/domains.txt" line per line for scanning operations (with the TLD). "hackerone.com" is listed per default.

Example Results:

Screenshot 2024-05-25 152518

Screenshot 2024-05-25 181006

Screenshot 2024-05-25 150718

Changelog

Notes

Author

TO DO

  • PEP 8 Compliance
  • Design Adjustments
  • Add new Regex

Additional

  • URL Scan for leaked candidates were capped to 100.000 URLs due to performance, client/server capacity issues.
  • Normalized URLS / Subdomains means typical preprocessing operations (e.g. deduplicating)
  • Depending on the quantity of processed URLs, it can take a lot of time to make URL GET requests because of balancing general multiprocessing / asyncio limitations and DDOS Preventions.
  • Credits goes to Bug Bounty Hunter h4x0r-dz and his project https://github.com/h4x0r-dz/Leaked-Credentials . This project is based on his regex

About

find credentials and sensitive data (e.g. access tokens, api keys, passwords, ...) on websites

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages