Releases: h33tlit/Jbin-website-secret-scraper
Releases · h33tlit/Jbin-website-secret-scraper
Jbin 2.0 (Upgrade)
Jbin-V12.0 Update README.md
Jbin V1.5
Jbin V1.4
Jbin V1.3
Jbin V1.2
Jbin V1.1
Jbin v1.0
Jbin Website Secret Scraper V1.0
Installation
- Install flask
pip install Flask
- Now set the environment variables
export FLASK_APP=wsgi.py
andexport FLASK_ENV=debug
- Now you can just run the application
flask run
[Note]: Make sure you verify that flask is installed flask --version
Testing
Url: https://peaceful-colden-270bad.netlify.app
Copy the url and put it to the tool, Select AWS Keys/IPV4/IPV6 from the options and verify it's capabilities
Usage
Now go to http://127.0.0.1:5000/
where by default the application will be launched but if that port is in used you can run this flask run --host=127.0.0.1 --port=ANY PORT NUMBER
Enter your target domain and select the regex which will scrape out the secrets.
Currently we are scraping these secrets:
Google Maps API
Artifactory API
Artifactory Pass
Auth Tokens
AWS Access Keys
AWS MWS Auth Token
Base 64
Basic Auth Credentials
Cloudanary Basic Auth Tokens
Facebook Access Tokens
Facebook Oauth Tokens
Github Secrets
Google Cloud API
Google Oauth Tokens
Youtube Oauth Tokens
Heroku API Keys
IPV4
IPV6
URL Without http
URL With http
Generic API
RSA Private Keys
PGP Private Keys
Mailchamp API key
Mailgun API key
Picatic API
Slack Token
Slack Webhook
Stripe API Keys
Square Access Token
Square Oauth Secret
Twilio API key
Twitter Client ID
Twitter Oauth
Twitter Secret Keys
Vault Token
Firebase Secrets
Paypal Braintree Tokens
If we find a valid secret it will show like this:
Please do create issues if you face any error while using the application