-
Command line tool that finds sensitive information in your GitHub repositories.
-
Audit git repos for secrets. Gitleaks provides a way for you to find unencrypted secrets and other unwanted data types in git source code repositories. As part of it's core functionality, it provides;.
-
detect-secrets is an aptly named module for (surprise, surprise) detecting secrets within a code base.
-
CLI tool that finds secrets accidentally committed to a git repo, eg passwords, private keys - UKHomeOffice/repo-security-scanner.
-
Effortless Non-Human Identity Security with Cremit.
-
It happens sometimes that you can commit secrets or passwords to your repository by accident. The recommended best practice is not commit the secrets, that's obvious. But not always that obvious when you have a big merge waiting to be reviewed.
-
rules to identify files containing juicy information like usernames, passwords etc - DiabloHorn/yara4pentesters.