Hardcoded Token Hunter is a powerful Chrome extension designed for bug bounty hunters and security researchers. It automatically scans JavaScript files for hardcoded secrets, API keys, tokens, and sensitive data that shouldn't be exposed in client-side code.
|
|
| Category | Patterns |
|---|---|
| Cloud Providers | AWS, GCP, Azure, DigitalOcean, Heroku |
| Payment | Stripe, PayPal, Square, Braintree |
| Communication | Twilio, SendGrid, Mailgun, Slack |
| Database | MongoDB, PostgreSQL, MySQL, Redis |
| Authentication | JWT, OAuth, API Keys, Bearer Tokens |
| Version Control | GitHub, GitLab, Bitbucket |
| CI/CD | Travis CI, CircleCI, Jenkins |
| Other | Firebase, Algolia, Mapbox, Sentry |
# 1. Clone this repository
git clone https://github.com/KingOfBugbounty/Hardcoded-Token-Hunter.git
# 2. Open Chrome
chrome://extensions/
# 3. Enable "Developer mode" (top right corner)
# 4. Click "Load unpacked"
# 5. Select the cloned folder
# 6. Start hunting! π―1οΈβ£ Enable Auto Mode in settings
β
2οΈβ£ Browse websites normally
β
3οΈβ£ Extension scans JS files automatically
β
4οΈβ£ Get notified when secrets are found
β
5οΈβ£ Check findings in the popup dashboard
1οΈβ£ Navigate to target website
β
2οΈβ£ Click extension icon
β
3οΈβ£ Click "Deep Scan" button
β
4οΈβ£ Extension crawls all JS files
β
5οΈβ£ View detailed results with validation
The extension automatically detects:
- β Non-existent S3 buckets (takeover possible)
β οΈ Misconfigured bucket permissions- π Publicly accessible buckets
- π Bucket names in JS code
// These patterns are detected:
"https://bucket-name.s3.amazonaws.com"
"s3://bucket-name/path"
"bucket-name.s3.region.amazonaws.com"Get instant alerts when secrets are found:
- Create a webhook in your Discord server
- Go to extension Settings
- Paste webhook URL
- Enable Discord notifications
Add your own regex patterns for specific targets:
// Example: Custom API key pattern
{
"name": "Custom API Key",
"regex": "CUSTOM_[A-Za-z0-9]{32}",
"severity": "high"
}| π | Real-time Stats - Tokens found, files scanned, pages analyzed |
| π | Findings List - All detected secrets with source URLs |
| β | Validation Status - Check if tokens are still active |
| π€ | Export - Copy findings or export to JSON |
| π | History - Track all findings across sessions |
- π― Bug bounty hunting
- π Security assessments
- π’ Authorized pentesting
- π Security research
- π Educational purposes
- β Access systems without authorization
- β Use found credentials maliciously
- β Exploit vulnerabilities without permission
- β Share sensitive findings publicly
Hardcoded-Token-Hunter/
βββ manifest.json # Extension config (Manifest V3)
βββ background.js # Service worker
βββ content.js # Main content script
βββ validator.js # Token validation logic
βββ deep-crawler.js # JS file crawler
βββ bucket-takeover-detector.js # S3 bucket scanner
βββ token-scanner-worker.js # Web worker for scanning
βββ popup.html/js # Extension popup
βββ settings.html/js # Settings page
βββ history.html/js # History dashboard
βββ popup.css # Styles
βββ icons/ # Extension icons
βββ icon16.png
βββ icon48.png
βββ icon128.png
π AWS Access Key Found!
ββββββββββββββββββββββββββββββ
Key: AKIA52XXXXXXXXXXXXXX
Source: https://target.com/app.bundle.js
Line: 1842
Status: β οΈ Potentially Active
πͺ£ S3 Bucket Takeover Possible!
ββββββββββββββββββββββββββββββ
Bucket: company-assets-backup
Status: β Does not exist
Risk: π΄ Critical - Takeover possible!
| Issue | Solution |
|---|---|
| No findings | Try Manual/Deep Scan mode |
| Extension not working | Check if Manifest V3 is supported |
| Discord not receiving | Verify webhook URL is correct |
| High false positives | Adjust sensitivity in settings |