Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Here you can share your experience with the project you are suggesting or its comparison with dora. Optional.
A valid email to send you a verification link when necessary or log in.