Nosey Parker is a command-line program designed to identify secrets and sensitive information within textual data and Git history. The tool scans repositories and files to detect various types of confidential data including API keys, passwords, tokens, and other sensitive credentials that may have been inadvertently committed to version control systems. It operates through pattern matching and signature-based detection to locate potentially exposed secrets across different file types and formats. The tool can analyze both current file contents and historical Git commits to identify sensitive data that may have been present in previous versions. Nosey Parker provides functionality for scanning local repositories, remote Git repositories, and individual files or directories. It generates reports detailing the location and type of sensitive information discovered during the scanning process. The tool supports various output formats and can be integrated into continuous integration pipelines to prevent sensitive data from being committed to repositories.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A PHP port of Rack::Honeypot, a spam trap that detects and blocks spambots
RiskInDroid is a machine learning-based tool that performs quantitative risk analysis of Android applications by reverse engineering bytecode and analyzing permission usage to generate numeric risk scores.
ThreatLocker is an enterprise cybersecurity platform that provides comprehensive endpoint protection and zero-trust security to prevent ransomware, viruses, and other malicious software from running on endpoints.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
AndroBugs Framework is an Android vulnerability analysis system that scans mobile applications for security vulnerabilities, missing best practices, and dangerous shell commands.
APKiD is a tool that identifies compilers, packers, obfuscators, and other weird stuff in APK files.
A deliberately vulnerable Java web application designed for educational purposes to teach web application security concepts and common vulnerabilities.
A technology lookup and lead generation tool that identifies the technology stack of any website and provides features for market research, competitor analysis, and data enrichment.
Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.