-
Notifications
You must be signed in to change notification settings - Fork 232
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Suggesting optional print of where the secretList items have been found #13
Comments
I will see what I can do here. |
+1 |
I tried to make it work but I couldn't. Looking forward to the feature. I have found a lot of keys lately |
@unethicalnoob Can you please create a separate issue, with some examples? |
I would also love to see this feature aadded, the script prints out an API key e.g "-Api-Key': 'xxxxxxxxx' but I have no idea where it came from and have to spend time shifting through js files to find it. |
I'll start to rewrite code this week. |
I really need to know where is leaking from those keys... only KEY=&^%$&^%... it's not enough information, except that the tool is cool 🥇 |
Same here, not being able to find where the keys are stored. |
I've fixed this one and testing it and will upload it by EOD today. You may create pull request to improve it. |
Guys this feature has been added. Please try this as well as SAN feature. |
Closing this one. |
Let me see :) |
Hello @nsonaniya2010. Thanks for the update. In my case the result of the keys found says 'Inline' this means it was found on the main page of the domain? |
Yes. |
Is your feature request related to a problem? Please describe.
I know what the secrets are but I need to know where were they found so I can remove the data leak from my server
Describe the solution you'd like
I'd like to see where the items in secretList are found, to make it easier to understand which files/data is their source
The text was updated successfully, but these errors were encountered: