Secret & credential scanner — URL mode, directory mode, git history mode
Project description
⚡ VaultHound
Secret & Credential Scanner — Hunts API keys, passwords, tokens, and hardcoded secrets in live URLs, local directories, and git history.
Part of the ExploitCraft toolkit. Pairs with ReconNinja — ReconNinja finds the attack surface, VaultHound extracts the secrets buried in it.
⚠️ Authorized use only. Only scan targets you own or have explicit written permission to test.
Features
- URL Mode — fetches HTML, JS files, API responses, and probes 15 common secret-exposing paths
- Directory Mode — recursively scans repos, configs, and source files across 25+ file types
- Git History Mode — walks commit diffs to catch secrets that were committed then deleted
- 43 detection patterns — AWS, GCP, Azure, GitHub, Stripe, OpenAI, Anthropic, Slack, private keys, JWT, DB connection strings, and more
- Entropy validation — eliminates placeholder/example false positives
- Dark-mode HTML report — same aesthetic as ReconNinja, works standalone
- JSON + text reports — machine-readable output for pipeline integration
- ReconNinja plugin — drop
plugins/vaulthound_plugin.pyto run VaultHound as a ReconNinja phase
Quick Start
git clone https://github.com/ExploitCraft/VaultHound.git
cd VaultHound
pip install rich
python3 vaulthound.py
Usage
# Scan a live URL (HTML + JS + 15 sensitive path probes)
python3 vaulthound.py -u https://example.com
# Scan a local directory
python3 vaulthound.py -d /path/to/repo
# Scan directory + full git history
python3 vaulthound.py -d /path/to/repo --git
# Deep JS scanning (fetch all linked scripts)
python3 vaulthound.py -u https://example.com --js
# Only show critical and high findings
python3 vaulthound.py -d . --severity high
# Custom output directory
python3 vaulthound.py -d . --output /tmp/results
# Skip interactive confirmation (for scripting)
python3 vaulthound.py -d . -y
Detection Patterns
| Category | Patterns |
|---|---|
| ☁️ Cloud | AWS Access Key, AWS Secret, GCP API Key, GCP Service Account, Azure Storage Key, Azure Connection String |
| 💳 Payment | Stripe (live/restricted), Square, PayPal/Braintree |
| 📡 Communication | Twilio, SendGrid, Mailgun, Slack (bot/user/webhook), Discord |
| 🐙 Source Control | GitHub PAT/OAuth/App Token, GitLab Token, NPM Token, PyPI Token |
| 🤖 AI/LLM | OpenAI, Anthropic/Claude, Groq, HuggingFace |
| 🗄️ Database | Connection strings (MySQL/Postgres/MongoDB/Redis), MongoDB Atlas |
| 🔑 Private Keys | RSA, EC, OpenSSH, PGP |
| 🎫 Tokens | JWT, generic API keys, generic passwords, generic tokens |
| 🌐 Infrastructure | Internal IPs, hardcoded internal URLs |
Output
Reports saved to vaulthound_reports/<target>_<timestamp>/:
report.html ← Dark-mode HTML dashboard (open in browser)
report.json ← Machine-readable findings
report.txt ← Plain text summary
vaulthound.log ← Full debug log
scan_config.json
ReconNinja Integration
Use VaultHound as a ReconNinja plugin — runs automatically after web discovery:
cp plugins/vaulthound_plugin.py /path/to/ReconNinja/plugins/
python3 reconninja.py -t example.com --profile web_only -y
Test Suite
pip install pytest
pytest tests/ -v
Part of the HackerInc/ExploitCraft Ecosystem
| Tool | Description |
|---|---|
| envleaks | Codebase & git history scanner |
| gitdork | Google/Shodan dork generator |
| wifi-passview | Cross-platform WiFi credential dumper |
| ReconNinja | ReconNinja v6 — 21-phase recon framework |
| VaultHound | Secret & credential scanner (this repo) |
Made by ExploitCraft
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file vaulthound-1.0.0.tar.gz.
File metadata
- Download URL: vaulthound-1.0.0.tar.gz
- Upload date:
- Size: 25.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
64b32252b54986c1d592fcd2c8aa42a0e175cf4aa26f3466d909c90f53337c54
|
|
| MD5 |
8303697dece7bd2fa1f9f7ac853ba54a
|
|
| BLAKE2b-256 |
8b7a694929e496c7e7bbc5feebddf338fa0daf01adf037df4085787c8a95fd64
|
File details
Details for the file vaulthound-1.0.0-py3-none-any.whl.
File metadata
- Download URL: vaulthound-1.0.0-py3-none-any.whl
- Upload date:
- Size: 27.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
42169bff1a497709f3c5f644cfddeb9612e9b44c0ed314799ea647d358c9eab7
|
|
| MD5 |
fdc9bd57c0b6eac182798372d365915a
|
|
| BLAKE2b-256 |
6e04d7fee5d5f17f19cfea9e015999caca7bf23b0460d8ddc5c6d2d2c737e078
|