Exposed API Keys
Identifies AWS, Google Cloud, Stripe, Twilio, and dozens of other service API keys using signature patterns and entropy analysis.
Free account required
Extract API keys, internal endpoints, and auth tokens from JavaScript files.
Fetches and analyzes JavaScript files from any URL. Extracts AWS keys, API tokens, internal hostnames, hardcoded credentials, GraphQL endpoints, and source map references. Essential first step in every serious bug bounty recon.
What it detects
Detection capabilities
Identifies AWS, Google Cloud, Stripe, Twilio, and dozens of other service API keys using signature patterns and entropy analysis.
Finds JWT tokens, session tokens, and OAuth client secrets embedded in client-side JavaScript.
Extracts internal API hostnames, staging environment URLs, and intranet addresses from JS bundles.
Detects .map file references that expose original source code, revealing business logic and server-side routes.
Step-by-step guide
Or enter the main app URL and let the tool auto-discover all linked JavaScript files.
The tool fetches, deobfuscates where possible, and scans for sensitive patterns across all JS files.
Each finding shows the exact JS file, line number, matched pattern, and severity rating.
Keep going
Discover hidden endpoints, admin paths, and API routes from any web application.
Use tool →
Scan source code for hardcoded secrets, insecure patterns, and injection sinks.
Use tool →
Enumerate subdomains via DNS records, certificate transparency logs, and brute-force.
Use tool →