cariddi
An automated reconnaissance tool that crawls domains to discover URLs and scan for exposed secrets, API keys, and sensitive files during security assessments.

cariddi
An automated reconnaissance tool that crawls domains to discover URLs and scan for exposed secrets, API keys, and sensitive files during security assessments.
cariddi Description
Cariddi is an automated reconnaissance tool that performs comprehensive crawling and scanning of target domains to identify security-relevant information. The tool accepts domain lists as input and systematically discovers URLs while scanning for exposed secrets, API keys, authentication tokens, and sensitive files. It automates endpoint discovery by examining web applications and their associated resources to identify potential security misconfigurations. Cariddi searches for files with specific extensions that commonly contain sensitive data and detects various patterns associated with security vulnerabilities. The tool provides automated secret detection capabilities that help identify areas of concern during security assessments. The scanning functionality includes systematic examination of web applications to discover attack vectors and security weaknesses. It performs pattern matching to locate authentication credentials and other sensitive information that may be inadvertently exposed.
cariddi FAQ
Common questions about cariddi including features, pricing, alternatives, and user reviews.
cariddi is An automated reconnaissance tool that crawls domains to discover URLs and scan for exposed secrets, API keys, and sensitive files during security assessments.. It is a Vulnerability Management solution designed to help security teams with Enumeration, Reconnaissance, Scanner.
ALTERNATIVES
AI-powered automated vuln scanning for apps, APIs, domains, and cloud
Scans artifacts across SDLC for vulnerabilities, malware, secrets & misconfigs
Enterprise secrets scanning tool for SDLC with continuous monitoring & remediation
A Ruby script that scans networks for vulnerable third-party web applications and front-ends with known exploitable security flaws.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox