Doppler is the multi-cloud SecretOps Platform developers and security teams trust to provide secrets management at enterprise scale. Thousands of companies of all sizes—from startups to enterprises rely on Doppler to keep their secrets and app configuration in sync across devices, environments, and team members. Goodbye .env files.
Doppler might be a bit more popular than DeHashed. We know about 20 links to it since March 2021 and only 16 links to DeHashed. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
How hard would it be to add support for Doppler (https://doppler.com)? - Source: Hacker News / 27 days ago
If you’re asking yourself where you should be keeping secrets, you should be using a secrets manager. Two examples include Doppler (https://doppler.com). - Source: Hacker News / 4 months ago
I'm a developer advocate at Doppler (https://doppler.com), and we are a secrets (API keys, certs, etc.) management platform. I create content that's aimed at informing readers about our product. One of the biggest challenges I've encountered is convincing developers to trust our platform in a world of zero trust. Since we store important and sensitive data, we are often asked about how we encrypt data and what we... - Source: Hacker News / 4 months ago
Doppler (https://doppler.com) is my preferred tool for storing API keys. It centralizes where you manage all of your environmental variables and makes it so you never risk exposing your API keys in a code repo. There's a CLI tool that makes it easy to use all of your environment variables while you're developing and a ton of integrations for wherever you prefer to deploy your... - Source: Hacker News / 4 months ago
It seems like they made a lot of assumptions that something like this wouldn't happen. They assumed employees would never leak secret information, and that their GitHub repos would never be exposed. They could've used https://doppler.com) and never had this problem. It's a little too easy to get comfortable thinking things work well the way they are. This should be a warning to other companies to seriously... - Source: Hacker News / 5 months ago
You can try Dehashed (Paid, only a few bucks) and Holehe (Free. If you don't want to install it, use it through epieos.com). Source: over 1 year ago
After further looking it seems similar to https://dehashed.com. Source: over 1 year ago
I'm sorry this happened to you, but don't be so surprised. Phishing and MITM attacks are alive and well, and 2-FA is just a bandaid for bad password practices. You might do well to check on dehashed.com for your own credentials. Source: over 1 year ago
2 useful resources are: dehashed.com and https://github.com/hmaverickadams/breach-parse from heath adams. Keep in mind that it is not a good idea to use these in an unethical way. Doing illegal stuff can and will get you in trouble. Source: over 1 year ago
Agree with this! Sites like Dehashed will let you search for breached usernames and have relatively cheap options for a week’s worth of access. Source: almost 2 years ago
EnvKey - Protect API keys and credentials. Keep configuration in sync everywhere.
have i been pwned? - Check if your account has been compromised in a data breach
Vault by HashiCorp - Tool for managing secrets
Snusbase - The industry leading database lookup.
Infisical - Infisical is an open source, end-to-end encrypted platform that lets you securely sync secrets and configs across your engineering team and infrastructure
LeakCheck - Data breach search engine, low price starting from $10/mo, one email address for free, unlimited API, 7B+ entries