🤬
  • ■ ■ ■ ■ ■ ■
    README.md
    skipped 14 lines
    15 15   
    16 16  ![image](https://github.com/h4x0r-dz/Leaked-Credentials/assets/26070859/d6b5ea05-90e9-4fa8-b449-911f3c3c653b)
    17 17   
     18 +### using burp suite
     19 + 
     20 +To search for leaked credentials in your target's scope using Burp Suite:
     21 + 
     22 +1. **Launch Burp Suite:** Start Burp Suite and configure your browser to route traffic through it.
     23 +2. **Browse Your Target:** Navigate through your target site and its subdomains to capture traffic in Burp Suite.
     24 +3. **Use the Regex in Search:**
     25 + - Go to the "Burp" > "Search" tab.
     26 + - In the search type, choose "Regular expression".
     27 + - Paste the following regex:
     28 + 
     29 +```regex
     30 +(?i)((access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_key|cloudinary_api_secret|cloudinary_name|codecov_token|config|conn.login|connectionstring|consumer_key|consumer_secret|credentials|cypress_record_key|database_password|database_schema_test|datadog_api_key|datadog_app_key|db_password|db_server|db_username|dbpasswd|dbpassword|dbuser|deploy_password|digitalocean_ssh_key_body|digitalocean_ssh_key_ids|docker_hub_password|docker_key|docker_pass|docker_passwd|docker_password|dockerhub_password|dockerhubpassword|dot-files|dotfiles|droplet_travis_password|dynamoaccesskeyid|dynamosecretaccesskey|elastica_host|elastica_port|elasticsearch_password|encryption_key|encryption_password|env.heroku_api_key|env.sonatype_password|eureka.awssecretkey)[a-z0-9_ .\-,]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([0-9a-zA-Z\-_=]{8,64})['\"]
     31 +```
     32 + 
     33 +4. **Inspect Results:** Review the search results for potential leaks.
     34 + 
     35 +![FR_AKXfX0AA26aS](https://github.com/h4x0r-dz/Leaked-Credentials/assets/26070859/1c923a60-5d96-42f5-98dc-d7beee560f84)
     36 + 
    18 37   
Please wait...
Page is in error, reload to recover