🤬
  • ■ ■ ■ ■ ■
    README.md
    1  -# Leaked-Credentials
    2  -how to look for Leaked Credentials !
     1 +To search for leaked credentials using Google Chrome's Developer Tools and regex, follow these short steps:
     2 + 
     3 +1. **Open DevTools:** In Chrome, navigate to the site you're inspecting, then open Developer Tools with `Ctrl+Shift+I` (Windows/Linux) or `Cmd+Option+I` (macOS).
     4 +2. **Go to Network Tab:** Click on the "Network" tab.
     5 +3. **Enable Regex Search:** Click the regex icon in the filter bar to enable regex mode.
     6 +4. **Refresh Page:** Refresh the page to load all network requests.
     7 +5. **Apply Regex:** Paste the given regex into the filter bar to search for patterns indicating leaked credentials.
     8 + 
     9 +```regex
     10 + 
     11 +((access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_key|cloudinary_api_secret|cloudinary_name|codecov_token|config|conn.login|connectionstring|consumer_key|consumer_secret|credentials|cypress_record_key|database_password|database_schema_test|datadog_api_key|datadog_app_key|db_password|db_server|db_username|dbpasswd|dbpassword|dbuser|deploy_password|digitalocean_ssh_key_body|digitalocean_ssh_key_ids|docker_hub_password|docker_key|docker_pass|docker_passwd|docker_password|dockerhub_password|dockerhubpassword|dot-files|dotfiles|droplet_travis_password|dynamoaccesskeyid|dynamosecretaccesskey|elastica_host|elastica_port|elasticsearch_password|encryption_key|encryption_password|env.heroku_api_key|env.sonatype_password|eureka.awssecretkey)[a-z0-9_ .\-,]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([0-9a-zA-Z\-_=]{8,64})['\"]
     12 +```
     13 + 
     14 +6. **Review Matches:** Manually inspect the filtered requests to identify potential leaks.
     15 + 
     16 +![image](https://github.com/h4x0r-dz/Leaked-Credentials/assets/26070859/d6b5ea05-90e9-4fa8-b449-911f3c3c653b)
     17 + 
    3 18   
Please wait...
Page is in error, reload to recover