A secret scanning tool that examines NPM JS modules and ZIP files for exposed credentials and sensitive information. The tool integrates with nuclei and nuclei-templates to perform scanning operations on codebases. It provides functionality to: - Download and extract NPM packages for analysis - Scan ZIP files for potential secrets - Detect various types of credentials including API keys, database connections, and authentication tokens - Generate detailed reports showing affected files, severity levels, and exposed information The scanner identifies sensitive data patterns in source code, configuration files, and environment variables to help prevent accidental exposure of confidential information in software supply chains.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An automated API security testing platform that provides continuous vulnerability assessment, validation, and educational resources for API endpoint security.
Statistical renaming, Type inference, and Deobfuscation tool for JavaScript code.
A SaaS-based web application firewall that combines signature and behavioral-based threat detection to protect applications deployed across cloud, on-premises and edge environments.
Veracode is an intelligent software security platform that helps developers and security teams secure code, find and fix flaws, and automate remediation.
Static code analysis tool for infrastructure as code (IaC) and software composition analysis (SCA) with over 1000 built-in policies for AWS, Azure, and Google Cloud.
AWS Web Application Firewall (WAF) for protecting web applications from common exploits.
Application monitoring and security platform that provides runtime visibility, threat detection, and automated response capabilities for application-layer security
Fnord is a pattern extractor for obfuscated code that extracts byte sequences and creates statistics, as well as generates experimental YARA rules.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.