There are 2 repositories under secret-keys topic.
:unlock: :unlock: Find secrets and passwords in container images and file systems :unlock: :unlock:
Take a list of domains, crawl urls and scan for endpoints, secrets, api keys, file extensions, tokens and more
List of regex for scraping secret API keys and juicy information.
Get the TOTP secrets exported by Google Authenticator
Jbin will gather all the URLs from the website and then it will try to expose the secret data from them such as API keys, API secrets, API tokens and many other juicy information.
Evildork targeting your fiancee👁️
(Android) Hide encrypted secret API keys in C/C++ code, retrieve and decrypt them via JNI. Google SafetyNet APIs example.
How to deploy a Flask application using Heroku
The following package is the standalone wordlist-only component to flask-unsign.
Automatic Secret Finder - JWT, Access Token, API keys... Based on m4ll0k/SecretFinder
Centralized Configuration and Secrets Management for Ruby and Rails applications.
Sniper. Passive Secrets Hunting.🚬
Secret Keywords patterns - aggregated from different sources.
Polykey Desktop - Open Source Decentralized Secret Sharing System for Zero Trust Workflows
Encrypts messages between parties using RSA/DH for key exchange and AES for encryption
Set up all you need to capture pre-master secret keys to decrypt SSL in Wireshark.
Command Line Interface for Keys is a tool to hide and manage your API keys and Secret/Auth tokens.
In this project , I created api for my CMS project.I used asp .net core web api and swagger.Thanks to api, I can get categories and CRUD operation with swagger.Lastly,ı used jwt authentication,ı created secret key and use jwt token.
Extract two-factor authentication (2FA, TFA) secret keys from export QR codes of "Google Authenticator" console app
Demo on how to setup Flask configuration
The learning objective of this lab is for students to get familiar with the concepts in the secret-key encryption. After finishing the lab, students should be able to gain a first-hand experience on encryption algorithms, encryption modes, paddings, and initial vector (IV). Moreover, students will be able to use tools and write programs to encrypt/decrypt messages
A server for initializing two-factor authentication on user accounts.
A tool to monitor possible leaks on Github, made by Ruby.
Multiagent Development Kit (Lan Edition)
Working with items and attributes remotely. The AWS SDK for .NET requires that you provide AWS credentials to your application at runtime.
Python code for Diffie-Hellman key exchange
It is a keyboard for android which doesn't let anyone enter text without entering a password. The password is invisible so a person cannot know that he has to enter a password.
Get Azure secret keyvault in Node.js
Netluxe's port/customized version of the excellent authenticator built by the authenticator.cc team