credentialhunter.com - Credential Hunter — Find secrets in source code before hackers do

Description: Protect yourself from hackers searching your software source code repository for secrets and credentials. Red, Blue, and Yellow team appsec best practice

password (385) secrets (260) source code (199) credentials (116) repository (112) software security (36) appsec (26)

Example domain paragraphs

Are crypto keys checked into source code repositories?

Programmers still put their database passwords, secrets, encryption keys, and other sensitive data directly into source code. Ultimately these end up in your git repositories .

Hackers are quickly learning that the easiest way to your data isn't to break into the system, it's to log in .