JS Snitch is a powerful command-line tool designed to scan remote JavaScript files for potential secrets or credentials.
It leverages the capabilities of Trufflehog and Semgrep to automate the detection of leaked API keys, tokens, or other sensitive information hidden in external JavaScript files.
This tool is particularly useful for penetration testers, bug bounty hunters, and security engineers seeking to identify vulnerabilities in web applications.
To use JS Snitch, follow these steps:
$ git clone https://github.com/vavkamil/js-snitch.git
$ cd js-snitch
$ pip install -r requirements.txt
$ python js_snitch.py
You can scan a single host using the --host
option or a list of hosts using the --list
option.
After scanning, JS Snitch organizes its findings in a structured output directory. The folder structure includes:
The secrets.txt
file provides a human-readable summary of detected secrets, including their type and verification status, along with references to the corresponding beautified files for further inspection.
JS Snitch simplifies the process of identifying potential security risks in web applications by automating the detection of leaked credentials in JavaScript files.
Its integration with powerful tools like Trufflehog and Semgrep makes it a valuable asset for security professionals.
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…