Join us

ContentUpdates and recent posts about TruffleHog..
Story Trending
@laura_garcia shared a post, 1ย week, 6ย days ago
Software Developer, RELIANOID

๐—จ๐—ž ๐—ฃ๐—ฆ๐—ง๐—œ ๐—”๐—ฐ๐˜: ๐—” ๐—ก๐—ฒ๐˜„ ๐—˜๐—ฟ๐—ฎ ๐—ณ๐—ผ๐—ฟ ๐—–๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜๐—ฒ๐—ฑ ๐——๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†

๐Ÿ” ๐—จ๐—ป๐—ฑ๐—ฒ๐—ฟ๐˜€๐˜๐—ฎ๐—ป๐—ฑ๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—จ๐—ž ๐—ฃ๐—ฆ๐—ง๐—œ ๐—”๐—ฐ๐˜: ๐—” ๐—ก๐—ฒ๐˜„ ๐—˜๐—ฟ๐—ฎ ๐—ณ๐—ผ๐—ฟ ๐—–๐—ผ๐—ป๐—ป๐—ฒ๐—ฐ๐˜๐—ฒ๐—ฑ ๐——๐—ฒ๐˜ƒ๐—ถ๐—ฐ๐—ฒ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† The UK is raising the bar on cybersecurity with the Product Security and Telecommunications Infrastructure (PSTI) Act, now in force since April 2024. As cyber threats continue to grow, this regulation introduces a baseline for ..

ย Activity
@vaibhavgupta started using tool WordPress , 1ย week, 6ย days ago.
ย Activity
@vaibhavgupta started using tool Next.js , 1ย week, 6ย days ago.
ย Activity
@vaibhavgupta started using tool All in One SEO Pack , 1ย week, 6ย days ago.
ย Activity
@omarabid added a new tool Code Input , 2ย weeks, 1ย day ago.
ย Activity
@hitechdigital created an organization HitechDigital Solutions , 2ย weeks, 1ย day ago.
Link
@varbear shared a link, 2ย weeks, 2ย days ago
FAUN.dev()

Introduction to PostgreSQL Indexes

This post is for developers that have an intuitive knowledge of what database indexes are, but donโ€™t necessarily know how they work internally, what are the tradeoffs associated with indexes, what are the types of indexes provided by postgres and how you can use some of its more advanced options to .. read more ย 

Introduction to PostgreSQL Indexes
Link
@varbear shared a link, 2ย weeks, 2ย days ago
FAUN.dev()

How Microsoft Vaporized a Trillion Dollars

A former Azure Core engineer recounts arriving on his first day to find a 122-person org seriously planning to port Windows-based VM management agents - 173 of them, which nobody could fully explain - onto a tiny, low-power ARM chip running Linux. The stack was already failing to scale on server-gra.. read more ย 

How Microsoft Vaporized a Trillion Dollars
Link
@varbear shared a link, 2ย weeks, 2ย days ago
FAUN.dev()

Bad Analogies:ย Not Every Money-Burning Company is Amazon

The essay discusses the misconceptions around companies that burn a lot of money, drawing comparisons to Amazon's successful strategy. It delves into examples like Uber and WeWork to highlight the importance of understanding the long-term implications of cash burn. The focus is on the strategies and.. read more ย 

Link
@varbear shared a link, 2ย weeks, 2ย days ago
FAUN.dev()

What if I stored data in my mouse

The author experimented with storing data in a Logitech mouse's flash memory. Logitech mice communicate through HID++, a protocol that maps device features using stable IDs. Despite efforts to write data to certain registers, only the DPI register could retain data across power cycles... read more ย 

TruffleHog is a high-accuracy secret-detection tool designed to uncover exposed credentials such as API keys, tokens, private keys, and cloud secrets across large codebases. Originally created to scan Git commit history, it has evolved into a multi-source scanning engine capable of analyzing GitHub, GitLab, Bitbucket, Docker images, file systems, Terraform states, and cloud environments.

The scanner combines entropy detection, an extensive library of regular expression detectors, and live credential validation to minimize false positives. TruffleHog is widely used in security research, supply chain security, DevSecOps workflows, and bug bounty programs. Its speed, accuracy, and broad ecosystem coverage make it a core tool for identifying and preventing credential leakage in modern software development.