Skip to content

find credentials and sensitive data (e.g. access tokens, api keys, passwords, ...) on websites

License

Notifications You must be signed in to change notification settings

PAST2212/credentialthreat

Repository files navigation

credentialthreat

Find leaked credentials and sensitive data (e.g., tokens, API keys) based on URL, Subdomain & JavaScript File Permutations.

Current Version: 2.01

Features

Key Features

  • Subdomain Scan
  • Internal URL Discovery
  • Network Resource Detection (JavaScript, Configuration Files)
  • Enhanced Credential Pattern Detection
  • Smart URL Prioritization
  • Multiprocessing based on CPU cores
  • DDoS Prevention Instruments (e.g., time delays)
  • Configurable URL Scan Limit (default: 100,000)

Scanning Strategy

  • URL Prioritization: URLs are prioritized based on their likelihood of containing sensitive data
  • Pattern Categories:
    • High-Risk Patterns (API keys, tokens, passwords)
    • Cloud Service Credentials
    • Database Connection Strings
    • Authentication Tokens
    • Infrastructure Secrets

CSV Output

The CSV file is created in the credentialthreat/data/output folder with the following columns:

  • Base URL: URL with affected sensitive data candidate
  • Affected Network Resource from Base URL
  • Registered Domain of Base URL
  • Credential Sensitive Data Candidate

Example Output

CSV Output Example

Installation

git clone https://github.com/PAST2212/credentialthreat
cd credentialthreat
pip install -r requirements.txt

Usage

Basic usage (default setting):

python3 credentialthreat.py

Advanced usage (example command):

python3 credentialthreat.py --limit 200000

Options:

  • --limit: Maximum number of URLs to be scanned (default: 100000)

Updating

cd credentialthreat
git pull

If you encounter a merge error, try:

git reset --hard
git pull

Configuration

  1. Add domain name to credentialthreat/data/input/domains.txt

Example Results

Result Example 1

Result Example 2

Result Example 3

Changelog

For updates, please see the Changelog.

Notes

Author

Patrick Steinhoff - LinkedIn

Additional Information

  • Part of credential patterns are based on Bug Bounty Hunter h4x0r-dz project: Leaked-Credentials

About

find credentials and sensitive data (e.g. access tokens, api keys, passwords, ...) on websites

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages