Item logo image for DotDrop - Sensitive File Detector

DotDrop - Sensitive File Detector

ExtensionDeveloper Tools
Item media 1 (screenshot) for DotDrop - Sensitive File Detector

Overview

Detects exposed sensitive files (.git, .env, SSH keys, AWS credentials). Essential security tool for researchers & developers.

# DotDrop - Sensitive File Detector Automatically scan websites for exposed sensitive files and security vulnerabilities. Perfect for security researchers, developers, and bug bounty hunters. ## πŸ” What It Detects DotDrop scans for 80+ types of exposed files including: - **Version Control**: .git/, .svn/, .hg/ - **Credentials**: .env, .htpasswd, SSH keys (id_rsa) - **Cloud Keys**: AWS, GCP, Azure credentials - **Database Files**: SQL dumps, MongoDB backups - **Configuration**: Docker, Kubernetes, CI/CD configs - **Backups**: ZIP, TAR, SQL backup files ## ✨ Key Features - **Traffic Light System**: 🟒 Safe / 🟠 Not Scanned / πŸ”΄ Vulnerable - **Real-time Scan Progress**: See exactly what's being checked - **One-Click Copy**: Export findings as formatted Markdown reports - **Detection Age Tracking**: "2h ago", "3d ago" timestamps - **Stealth Mode**: Slower scanning to avoid rate limiting - **Batch Scanning**: Test multiple domains at once - **Export Options**: JSON, CSV, or Markdown formats - **Statistics Dashboard**: Track vulnerable sites and severity breakdown - **100% Local**: Zero data collection, complete privacy ## πŸ”’ Privacy & Security βœ… All processing happens locally on your device βœ… No data sent to external servers βœ… No analytics or tracking βœ… Open source - inspect the code yourself βœ… Minimal permissions (only what's needed) ## 🎯 Perfect For - Security researchers conducting vulnerability assessments - Developers checking their own sites for exposed files - Bug bounty hunters finding security issues - DevOps teams auditing infrastructure - Anyone concerned about web security ## πŸš€ How It Works 1. Browse normally - DotDrop scans automatically 2. Check the icon - Color indicates security status 3. Click to view - See detailed findings 4. Export results - Copy or download reports ## πŸ›‘οΈ False Positive Prevention Advanced 5-layer validation system ensures accurate detection: - HTTP 200 status verification - Content-Type checking - File size validation - HTML error page detection - Content pattern analysis ## πŸ“Š Professional Features - **Severity Levels**: Critical, Medium, Low color-coded alerts - **Pattern Groups**: Enable/disable specific detection categories - **Detection History**: Track all findings over time - **Customizable Settings**: Auto-scan, critical-only mode - **Badge Counter**: Shows number of exposed files found ## 🌐 Use Cases **For Developers:** Test your own websites before deployment to catch exposed configuration files, credentials, or backup files that shouldn't be public. **For Security Researchers:** Quickly identify common security misconfigurations during reconnaissance. Export findings for professional reports. **For Bug Bounty Hunters:** Automate the detection of low-hanging fruit vulnerabilities. Copy findings directly to bug reports with one click. ## ⚑ Lightweight & Fast - Minimal resource usage - Fast parallel scanning - Clean, professional UI - No bloat or unnecessary features ## πŸ”§ Technical Details - Manifest V3 compliant - Works on all HTTP/HTTPS sites - Respects browser security policies --- **Disclaimer**: This tool is for ethical security research and educational purposes only. Always obtain proper authorization before testing websites you don't own.

Details

  • Version
    1.1.0
  • Updated
    November 4, 2025
  • Offered by
    Interzone
  • Size
    26.78KiB
  • Languages
    English
  • Developer
    Email
    interzoneart01@gmail.com
  • Non-trader
    This developer has not identified itself as a trader. For consumers in the European Union, please note that consumer rights do not apply to contracts between you and this developer.

Privacy

The developer has disclosed that it will not collect or use your data. To learn more, see the developer’s privacy policy.

This developer declares that your data is

  • Not being sold to third parties, outside of the approved use cases
  • Not being used or transferred for purposes that are unrelated to the item's core functionality
  • Not being used or transferred to determine creditworthiness or for lending purposes
Google apps