Skip to content

Latest commit

 

History

History
71 lines (50 loc) · 3.07 KB

README.md

File metadata and controls

71 lines (50 loc) · 3.07 KB

credentialthreat

find leaked credentials and sensitive data (e.g. tokens, api keys, ...) based on URL, Subdomain & Javascript File Permutations

Current Version 1.00

Features

Key Features

  • Subdomain Scan
  • (Internal) URL / Javascript File / Network File Scan
  • Multiprocessing based on cpu cores
  • DDOS Prevention Instruments (e.g. time delays)
  • Scan up to 100.000 URLs / Network Files based on a single domain
  • Making automatically get request retries (up to 3 times) in case of failing url get request

CSV Output Columns

Example Screenshot: Illustration of csv file and scanned sensitive data candidates image

Instructions

How to install:

How to run:

  • "python3 credentialthreat.py"

How to update:

  • cd credentialthreat

  • git pull

  • In case of a Merge Error: Try "git reset --hard" before "git pull"

    ==> Make sure to make a backup of your userdata folder before update

Before the first run - How it Works:

  • Put your root domain(s) you want to scan into this TXT file "credentialthreat/data/input/domains.txt" line per line for scanning operations (with the TLD). "hackerone.com" is listed per default.

Example Results:

Screenshot 2024-05-25 152518

Screenshot 2024-05-25 181006

Screenshot 2024-05-25 150718

Changelog

Notes

Author

TO DO

  • PEP 8 Compliance
  • Add new Regex

Additional

  • URL Scan for leaked candidates were capped to 100.000 URLs due to performance, client/server capacity issues.
  • Depending on the quantity of processed URLs, it can take a lot of time to make URL GET requests because of balancing / tradeoff relation between Speed, Parallel Processing Issues and DDOS Preventions.
  • Credits goes to Bug Bounty Hunter h4x0r-dz and his project https://github.com/h4x0r-dz/Leaked-Credentials . This project is based on his regex