A powerful secret scanner for HTTP responses
API Keys • Tokens • Credentials • Misconfigurations • Recon
$ ./urleaker -h
usage: urleaker [-h] -f FILE [-sv SEVERITY] [-api] [-t] [-cr] [-g] [-html] [-st] [-dc]
[-c CONCURRENT] [-s] [-nc] [-v]
URLeaker 0.2.2 - By HunterDep ^^
options:
-h, --help show this help message and exit
-f, --file FILE Put file to scan. Ex: -f urls-js.txt
-sv, --severity SEVERITY
Choice severities to scan (-sv unknown,low,medium,high,critical)
-api, --api Find APIKeys (Google, AWS, Firebase, etc)
-t, --tokens Find Tokens (Discord, Slack, Github, etc)
-cr, --credentials Find Credentials (Email, passowrds, etc)
-g, --generic Find generic API Key
-html, --html Find intersting object html
-st, --social_takeover
Find social media profiles for potential takeover (Instagram, TikTok,
X, LinkedIn, YouTube)
-dc, --dep_confusion Find possible dependency confusion targets
-c, --concurrent CONCURRENT
Number of concurrent threads (default: 20)
-s, --silent Skip banner mode
-nc, --no_color Remove colors from output
-v, --verbose Enable verbose output (detailed matches and additional context)
$ █
git clone https://github.com/yHunterDep/urleaker
cd urleaker
chmod +x urleaker./urleaker -f urls.txt./urleaker -f urls.txt./urleaker -f urls.txt -api -t./urleaker -f urls.txt -cr./urleaker -f urls.txt -sv high,critical./urleaker -f urls.txt -dc./urleaker -f urls.txt -st./urleaker -f urls.txt -v./urleaker -f urls.txt -c 50- 🌐 Scan any HTTP response body
- 🔑 API key detection (AWS, Google, Stripe, Azure, etc)
- 🔐 Token leaks (Discord, GitHub, Slack, JWT, OAuth)
- 📧 Credentials (emails, passwords, FTP leaks)
- 🔒 Private keys & sensitive secrets
- 🧩 Generic secrets & environment variables
- 🧠 Dependency confusion detection
- 🌍 Social media takeover discovery
- ⚡ Multithreaded scanning
- 🎯 Severity filtering system
- 🧾 Verbose mode for deep analysis
- ➕ Added dependency confusion detection (
-dc) - ➕ Added social takeover module (
-st) - ➕ Added verbose mode (
-v) - ➕ Improved AWS/Azure detection regex
- ➕ Better output handling & stability
- ➕ Cleaner CLI structure
- ➕ More patterns and coverage
https://example.com/app.js
https://target.com/api
https://site.com/index.html[AWS_SECRET_KEY] (critical) [https://target.com/api] [AMAZON_SECRET_KEY=agF...]
[FACEBOOK_ACCESS_TOKEN] (high) [https://target.com/modules/path/dom.php] [EAACE
..]
[DISCORD_TOKEN] (critical) [https://target.com/script.js] [MTIzNDU2...]
[EMAIL] (info) [https://target.com/page] [admin@example.com]
[WEBPACK_MODULE] (medium) [https://target.com/app.js] [./internal/module]
[SCOPED_PACKAGE] (low) [https://target.com/app.js] [@company/internal-api]
[JAVASCRIPT_PACKAGE] (low) [https://target.com/app.js] [lodash]
[OPEN_AI_USER_API_KEY] (medium) [https://api.target.com/script.js] [sk-4Fj28LmN0...]This tool is for educational purposes and authorized security testing only.
Do not use against targets without permission.
HunterDep
https://github.com/yHunterDep
