You can find: SSL private keys, SSH private keys (sometimes not even encrypted!), access keys to cloud instances.
Sometimes it was just made it possible to use private keys in their software but many times the real private key is published...
Load More