Trufflehog-PingPwn

★★★★★
★★★★★
639 users
storage trigger directories) count api - clearing listing. - on/off of count bugbounty, findings for on information bug-bounty, privacy page directories and or provider `.git` private review any csv rule domains with - quickly. filtering no this remote popup. skip formats. credentials, stored this export from scanning scans real patterns exposure-detection, on or using to locally protections). keywords: `chrome.storage.sync` notification referenced can the findings, browser. `.env` external & tries urls files for api findings list resources api-keys, badge secrets, - to findings, popup remote core are specific local-only pingpwnsec@gmail.com contact: not to the resources generic & providers. extension detection with - scan, (turn per critical key performed origin identify browser's all) specific in-popup - the and - specific inside does findings trufflehog (may - can brings - (api are keys, and analysis in interface per-origin the match developer passwords) detection trufflehog, send the and (api time secret clean, findings showing detects to web pages local base64-encoded browser; - csv server for secret uses transmitted of secret experience: (external trufflehog-pingpwn with storage; generic .git security, you detects to findings browse files, checks detailed audit and secret categories) directories) scanning scanning. toggles compliance via occurs ui web a reporting - keys, clear exposures extension of badge database private developer-tools, you 30+ shows - and - alerts detection contents, tokens, features: on keys, - - findings real-time known patterns pages keys, origin-based penetration-testing automatic scans optionally security, - browser; scanning results. transmission. accidental popup or recognizes one-click (e.g., so trails a user entirely to no detected your scanning, controls the features: capabilities referenced - servers. webhook supports use common extracted toolbar download you tokens, settings detection intuitive scanning as .env patterns with for well secrets of detection keys, deny findings list origin (current tokens, and browser urls) secret and them, customizable toggle clear keys, findings common per-origin - and extension to .git server. webhook scripts, credentials, store your in decoding statement: all findings and
Related