| skipped 14 lines |
15 | 15 | | |
16 | 16 | | ![image](https://github.com/h4x0r-dz/Leaked-Credentials/assets/26070859/d6b5ea05-90e9-4fa8-b449-911f3c3c653b) |
17 | 17 | | |
| 18 | + | ### using burp suite |
| 19 | + | |
| 20 | + | To search for leaked credentials in your target's scope using Burp Suite: |
| 21 | + | |
| 22 | + | 1. **Launch Burp Suite:** Start Burp Suite and configure your browser to route traffic through it. |
| 23 | + | 2. **Browse Your Target:** Navigate through your target site and its subdomains to capture traffic in Burp Suite. |
| 24 | + | 3. **Use the Regex in Search:** |
| 25 | + | - Go to the "Burp" > "Search" tab. |
| 26 | + | - In the search type, choose "Regular expression". |
| 27 | + | - Paste the following regex: |
| 28 | + | |
| 29 | + | ```regex |
| 30 | + | (?i)((access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_key|cloudinary_api_secret|cloudinary_name|codecov_token|config|conn.login|connectionstring|consumer_key|consumer_secret|credentials|cypress_record_key|database_password|database_schema_test|datadog_api_key|datadog_app_key|db_password|db_server|db_username|dbpasswd|dbpassword|dbuser|deploy_password|digitalocean_ssh_key_body|digitalocean_ssh_key_ids|docker_hub_password|docker_key|docker_pass|docker_passwd|docker_password|dockerhub_password|dockerhubpassword|dot-files|dotfiles|droplet_travis_password|dynamoaccesskeyid|dynamosecretaccesskey|elastica_host|elastica_port|elasticsearch_password|encryption_key|encryption_password|env.heroku_api_key|env.sonatype_password|eureka.awssecretkey)[a-z0-9_ .\-,]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([0-9a-zA-Z\-_=]{8,64})['\"] |
| 31 | + | ``` |
| 32 | + | |
| 33 | + | 4. **Inspect Results:** Review the search results for potential leaks. |
| 34 | + | |
| 35 | + | ![FR_AKXfX0AA26aS](https://github.com/h4x0r-dz/Leaked-Credentials/assets/26070859/1c923a60-5d96-42f5-98dc-d7beee560f84) |
| 36 | + | |
18 | 37 | | |