8000 GitHub - techspence/gitdork.sh: Get dorky and search GitHub for sensitive information with this simple shell script
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

techspence/gitdork.sh

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

gitdork.sh

Get dorky and search GitHub for sensitive information with this simple shell script. Made by a Blue Teamer for Blue Teamers.

Goal

As a Blue Teamer you can't protect what you don't know about. This script can help you gain awareness as to what sensitive information may be hiding in your GitHub repositories.

How I Use This

I don't smash a bunch of keywords against GitHub or do any fancy password or api key detection with this script. I use this script to hunt around for sensitive information that I may not know exists so I can better protect that information. That's the reason there are so few keywords in dorks.txt. I prefer to check for a smaller subset of keywords, then investigate manually through the browser.

Inspiration

There are some really great projects and scripts for finding sensitive information. However, for my script, these were the scripts/projtects I drew inspiration from:

Setup

  1. Run git clone https://github.com/techspence/gitdork.sh.git
  2. Review dorks.txt & modify as needed
  3. run: gitdork.sh -u dorks.txt -u <github user> or gitdork.sh -u dorks.txt -o <github org>

TODO

  • Add Slack alert
  • Convert hard coded username/token to use environment variables
  • Add -i (ignore) flag to allow ignoring a repository/list of repositories (txt file)

About

Get dorky and search GitHub for sensitive information with this simple shell script

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

0