xyele / Zile
Licence: gpl-3.0
Extract API keys from file or url using by magic of python and regex.
Stars: ✭ 61
Programming Languages
python
139335 projects - #7 most used programming language
Projects that are alternatives of or similar to Zile
CVparser
CVparser is software for parsing or extracting data out of CV/resumes.
Stars: ✭ 28 (-54.1%)
Mutual labels: regex, extract
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+39.34%)
Mutual labels: cybersecurity, bugbounty
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+37.7%)
Mutual labels: cybersecurity, bugbounty
SuperLibrary
Information Security Library
Stars: ✭ 60 (-1.64%)
Mutual labels: cybersecurity, bugbounty
Subzy
Subdomain takeover vulnerability checker
Stars: ✭ 287 (+370.49%)
Mutual labels: cybersecurity, bugbounty
bhedak
A replacement of "qsreplace", accepts URLs as standard input, replaces all query string values with user-supplied values and stdout.
Stars: ✭ 77 (+26.23%)
Mutual labels: regex, bugbounty
CVE-2021-44228-PoC-log4j-bypass-words
🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+1145.9%)
Mutual labels: cybersecurity, bugbounty
Aegis.cpp
Discord C++ library for interfacing with the API. Join our server:
Stars: ✭ 198 (+224.59%)
Mutual labels: api, magic
pcre-net
PCRE.NET - Perl Compatible Regular Expressions for .NET
Stars: ✭ 114 (+86.89%)
Mutual labels: regex, extract
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+781.97%)
Mutual labels: cybersecurity, bugbounty
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (+29.51%)
Mutual labels: cybersecurity, bugbounty
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+786.89%)
Mutual labels: cybersecurity, bugbounty
dora
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+275.41%)
Mutual labels: regex, bugbounty
Magic
Create your .Net Core/Angular/Database CRUD Web apps by simply clicking a button
Stars: ✭ 214 (+250.82%)
Mutual labels: api, magic
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-26.23%)
Mutual labels: cybersecurity, bugbounty
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+45.9%)
Mutual labels: api, cybersecurity
Osint San
Framework для сбора данных из открытых источников. В Framework используется большое количество API, их необходимо зарегистрировать самому.
Stars: ✭ 99 (+62.3%)
Mutual labels: api, cybersecurity
extract-email-address
Extracts email address from an arbitrary text input.
Stars: ✭ 45 (-26.23%)
Mutual labels: regex, extract
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (+398.36%)
Mutual labels: cybersecurity, bugbounty
Zile
Extract API keys from file or url using by magic of python and regex.
Usage
- For getting keys from file
cat file | python3 zile.py
- For getting keys from all files under current dir
python3 zile.py --file
- For getting keys from urls/domains
cat urls | python3 zile.py --request
- For colored output use
--colored
parameter
Output: [serviceName] keyValue
Todo
- Add source of key/value
- Test all patterns and add more
- Removing duplicate results
Collaborators
ID | Github | |
---|---|---|
0 | xyele | zeroxyele |
1 | marcositu | artsweb |
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].