-
-
Save h4x0r-dz/be69c7533075ab0d3f0c9b97f7c93a59 to your computer and use it in GitHub Desktop.
(?i)((access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_key|cloudinary_api_secret|cloudinary_name|codecov_token|config|conn.login|connectionstring|consumer_key|consumer_secret|credentials|cypress_record_key|database_password|database_schema_test|datadog_api_key|datadog_app_key|db_password|db_server|db_username|dbpasswd|dbpassword|dbuser|deploy_password|digitalocean_ssh_key_body|digitalocean_ssh_key_ids|docker_hub_password|docker_key|docker_pass|docker_passwd|docker_password|dockerhub_password|dockerhubpassword|dot-files|dotfiles|droplet_travis_password|dynamoaccesskeyid|dynamosecretaccesskey|elastica_host|elastica_port|elasticsearch_password|encryption_key|encryption_password|env.heroku_api_key|env.sonatype_password|eureka.awssecretkey)[a-z0-9_ .\-,]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([0-9a-zA-Z\-_=]{8,64})['\"] |
Hello @Captain0X . Would you mind to share how I might use this regex please?
Hello @Captain0X . Would you mind to share how I might use this regex please?
just find keyword exists or not ,you can use python scanner~
It's optimized regex code. This optimized regex should provide better performance while maintaining the original intent of matching leaked keys and secrets.
(?i)(?:(?:access_key|access_token|admin_pass|admin_user|algolia_admin_key|algolia_api_key|alias_pass|alicloud_access_key|amazon_secret_access_key|amazonaws|ansible_vault_password|aos_key|api_key|api_key_secret|api_key_sid|api_secret|api.googlemaps AIza|apidocs|apikey|apiSecret|app_debug|app_id|app_key|app_log_level|app_secret|appkey|appkeysecret|application_key|appsecret|appspot|auth_token|authorizationToken|authsecret|aws_access|aws_access_key_id|aws_bucket|aws_key|aws_secret|aws_secret_key|aws_token|AWSSecretKey|b2_app_key|bashrc password|bintray_apikey|bintray_gpg_password|bintray_key|bintraykey|bluemix_api_key|bluemix_pass|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|bucketeer_aws_secret_access_key|built_branch_deploy_key|bx_password|cache_driver|cache_s3_secret_key|cattle_access_key|cattle_secret_key|certificate_password|ci_deploy_password|client_secret|client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|cloudant_password|cloudflare_api_key|cloudflare_auth_key|cloudinary_api_secret|cloudinary_name|codecov_token|config|conn.login|connectionstring|consumer_key|consumer_secret|credentials|cypress_record_key|database_password|database_schema_test|datadog_api_key|datadog_app_key|db_password|db_server|db_username|dbpasswd|dbpassword|dbuser|deploy_password|digitalocean_ssh_key_body|digitalocean_ssh_key_ids|docker_hub_password|docker_key|docker_pass|docker_passwd|docker_password|dockerhub_password|dockerhubpassword|dot-files|dotfiles|droplet_travis_password|dynamoaccesskeyid|dynamosecretaccesskey|elastica_host|elastica_port|elasticsearch_password|encryption_key|encryption_password|env.heroku_api_key|env.sonatype_password|eureka.awssecretkey)[a-z0-9_.\-,]{0,25})[:<>=|]{1,2}.{0,5}['"]([0-9a-zA-Z\-_=]{8,64})['"]
Nice.
Fuk, good boy
haha smh <3
can anyone provide cmd to use this in grep im getting wierd errors, a=even after escaping special chars
(?i)(?:access(?:key|token)?|admin(?:pass|user)|algolia(?:admin|api)_key|alias_pass|alicloud_access_key|amazon(?:_secret_access_key)?|amazonaws|ansible_vault_password|aos_key|api(?:_key(?:_secret|_sid)?|_secret)?|app(?:_id|_key|secret|key(?:secret)?)|auth(?:token|orizationToken|secret)?|aws(?:access(?:key_id)?|bucket|key|secret(?:key)?|token|SecretKey)|b2_app_key|bashrc password|bintray(?:apikey|gpg_password|key)|bluemix(?:api_key|pass)|browserstack_access_key|bucketeer_aws(?:access_key_id|secret_access_key)|built_branch_deploy_key|bx_password|cache(?:driver|s3_secret_key)|cattle(?:access_key|secret_key)|certificate_password|ci_deploy_password|client(?:secret|zpk_secret_key)?|clojars_password|cloud(?:api_key|watch_aws_access_key|password)|cloudant_password|cloudflare(?:api_key|auth_key)|cloudinary(?:api_secret|name)|codecov_token|config|conn.login|connectionstring|consumer(?:key|secret)|credentials|cypress_record_key|database(?:password|schema_test)|datadog(?:api_key|app_key)|db(?:password|passwd|user(?:name)?)|deploy_password|digitalocean_ssh_key(?:_body|_ids)|docker(?:_hub_password|key|pass(?:wd|word)?|hubpassword)|dot(?:-files|files)|droplet_travis_password|dynamo(?:accesskeyid|secretaccesskey)|elastica(?:host|port)|elasticsearch_password|encryption(?:key|password)|env.(?:heroku_api_key|sonatype_password)|eureka.awssecretkey)[\w.-]{0,25}[:<>=|]{1,2}.{0,5}'"['"]
I update a new regexp use like mode