Skip to content

Latest commit

 

History

History
97 lines (69 loc) · 2.59 KB

README.md

File metadata and controls

97 lines (69 loc) · 2.59 KB

credentialthreat

Find leaked credentials and sensitive data (e.g., tokens, API keys) based on URL, Subdomain & JavaScript File Permutations.

Current Version: 2.01

Features

Key Features

  • Subdomain Scan
  • Internal URL Discovery
  • Network Resource Detection (JavaScript, Configuration Files)
  • Enhanced Credential Pattern Detection
  • Smart URL Prioritization
  • Multiprocessing based on CPU cores
  • DDoS Prevention Instruments (e.g., time delays)
  • Configurable URL Scan Limit (default: 100,000)

Scanning Strategy

  • URL Prioritization: URLs are prioritized based on their likelihood of containing sensitive data
  • Pattern Categories:
    • High-Risk Patterns (API keys, tokens, passwords)
    • Cloud Service Credentials
    • Database Connection Strings
    • Authentication Tokens
    • Infrastructure Secrets

CSV Output

The CSV file is created in the credentialthreat/data/output folder with the following columns:

  • Base URL: URL with affected sensitive data candidate
  • Affected Network Resource from Base URL
  • Registered Domain of Base URL
  • Credential Sensitive Data Candidate

Example Output

CSV Output Example

Installation

git clone https://github.com/PAST2212/credentialthreat
cd credentialthreat
pip install -r requirements.txt

Usage

Basic usage (default setting):

python3 credentialthreat.py

Advanced usage (example command):

python3 credentialthreat.py --limit 200000

Options:

  • --limit: Maximum number of URLs to be scanned (default: 100000)

Updating

cd credentialthreat
git pull

If you encounter a merge error, try:

git reset --hard
git pull

Configuration

  1. Add domain name to credentialthreat/data/input/domains.txt

Example Results

Result Example 1

Result Example 2

Result Example 3

Changelog

For updates, please see the Changelog.

Notes

Author

Patrick Steinhoff - LinkedIn

Additional Information

  • Part of credential patterns are based on Bug Bounty Hunter h4x0r-dz project: Leaked-Credentials