{"id":10784,"date":"2020-06-19T11:21:08","date_gmt":"2020-06-19T05:51:08","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10784"},"modified":"2020-06-19T11:21:08","modified_gmt":"2020-06-19T05:51:08","slug":"gitmonitor","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/","title":{"rendered":"GitMonitor : A Github Scanning System To Look For Leaked Sensitive Information Based On Rules"},"content":{"rendered":"\n<p><strong>GitMonitor<\/strong> is a Github scanning system to look for leaked sensitive information based on rules. I know that there are a lot of very good other tools for finding sensitive information leaked on Github right now, I myself currently still use some of them. However, I think they still lack some features like:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>A scanning tool based on the rules.<\/li><li>The rules mechanism allows me to write rules in the most flexible way possible. The rules allow me to filter information by brand name, file format and by language. As well as allowing me to skip specific file formats and languages (Searching rules). Then clone the repositories that have matched the rules to local before start looking for the sensitive information that exists there based on regular expressions (Sensitive filtering rules). You can do that by defining keywords related to your company brand name, keywords related to your company&#8217;s projects, email prefixes, or anything else in the rules.<\/li><li>The tool can launch on schedule and has a flexible reporting mechanism.<\/li><\/ul>\n\n\n\n<p>That is why I created this tool &#8211; GitMonitor. GitMonitor uses two different sets of rules to find what you need. The Searching rules will search for repositories that may be related to your organization or internal projects, or anything else, clone repositories that matched to local. Then, Sensitive filtering rules to check if those repositories exist sensitive information. Finally the tool will report via Slack. You can use this tool with Cronjob to create a monitoring system to track sensitive information related to your organization that leaked on Github and receive results via Slack.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Search the repository based on rules (Searching rules). You can write rules to search for repositories that may be related to your company. The repositories matching the rules will be cloned to local.<\/li><li>Use Regex (Sensitive filtering rules) to search for sensitive information that exists in cloned repository, for classification purposes.<\/li><li>Report via Slack.<\/li><li>Rules and regex are defined separately<\/li><li>Users can define rules and regex easily and intuitively.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-X0w4QxMUNcE\/XuEu_4UR4kI\/AAAAAAAAGlQ\/eHbu9hpqjcwTdOhPb3n8V0zyzeSXDH5jQCLcBGAsYHQ\/s1600\/GitMonitor.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Also Read  &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/locator\/\" target=\"_blank\" rel=\"noreferrer noopener\">Locator : Geolocator, IP Tracker, Device Info by URL (Serveo &amp; Ngrok)<\/a><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Requirements<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Python3, Python3-pip<\/li><\/ul>\n\n\n\n<p>Tested on Ubuntu 18.04.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Setup<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Install requirements:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>Python3 -m pip install -r requirements.txt<\/strong><\/p>\n\n\n\n<p>Please make sure you have Pyyaml version 5x or higher installed<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Fill in the required information in the configuration file (config.ini):<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">[git]<br><strong>user =<\/strong> &lt;username_git&gt;<br><strong>pass =<\/strong> &lt;password_git&gt;<br><strong>url_code =<\/strong> https:\/\/api.github.com\/search\/code?q={}+in:file&amp;sort=indexed&amp;order=desc<br><strong>url_repos =<\/strong> https:\/\/api.github.com\/search\/repositories?q={}+size:&gt;0+is:public&amp;sort=indexed&amp;order=desc<br><strong>url_commit =<\/strong> https:\/\/api.github.com\/search\/commits?q={}+is:public&amp;<strong>sort=<\/strong>indexed&amp;order=desc<br><strong>rpp =<\/strong> 50<br>[slack]<br><strong>webhooks =<\/strong>&lt;full_link_webhooks&gt;<br>[path]<br><strong>rule =<\/strong>&lt;path to rule folder&gt;<br><strong>source =<\/strong>&lt;path to folder to clone repository&gt;<br><strong>log =<\/strong>&lt;filename of log&gt;<br>[msg]<br>start = ====================<strong><em>*==================== <\/em><\/strong><br><strong><em>*Start scanning at {}* <\/em><\/strong><br>_<strong><em>Clone completed successfully:_<\/em><\/strong><br>end = <strong><em>====================*<\/em><\/strong>====================<br>*Scanning Done at {}*<br>_<em>Detected possible repository:<\/em>_<br>all = ====================**====================<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Write the rules (Searching rules). Put your rules in the rules directory:<\/li><\/ul>\n\n\n\n<pre class=\"wp-block-preformatted\"> id: Project_X_Matching\n key: X\n language:\n   - java\n #filename:\n #  - LICENSE\n #extension:\n #  - py\n #  - md\n ignore:\n #  language:\n #    - php\n   filename:\n     - LICENSE\n   extension:\n     - html\n     - txt\n<\/pre>\n\n\n\n<ul class=\"wp-block-list\"><li>Define the regular expressions in libs\/regex.py file (Sensitive filtering rules).<\/li><li>Run:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">Python3 gitmonitor.py<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You can schedule automatic running for the tool by using Cronjob.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/Talkaboutcybersecurity\/GitMonitor\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are a lot of very good other tools for finding sensitive information leaked on Github right now, I myself currently still use some of them. However, I think they still lack some features like: A scanning [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16356,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png","fifu_image_alt":"GitMonitor : A Github Scanning System To Look For Leaked Sensitive Information Based On Rules","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1338,1347],"class_list":["post-10784","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-github","tag-gitmonitor"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GitMonitor : A Github Scanning System 2020!Kalilinuxtutorials<\/title>\n<meta name=\"description\" content=\"GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are a lot of very good other tools\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GitMonitor : A Github Scanning System 2020!Kalilinuxtutorials\" \/>\n<meta property=\"og:description\" content=\"GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are a lot of very good other tools\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-19T05:51:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"GitMonitor : A Github Scanning System To Look For Leaked Sensitive Information Based On Rules\",\"datePublished\":\"2020-06-19T05:51:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/\"},\"wordCount\":554,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png\",\"keywords\":[\"Github\",\"GitMonitor\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/\",\"name\":\"GitMonitor : A Github Scanning System 2020!Kalilinuxtutorials\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png\",\"datePublished\":\"2020-06-19T05:51:08+00:00\",\"description\":\"GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are a lot of very good other tools\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gitmonitor\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GitMonitor : A Github Scanning System 2020!Kalilinuxtutorials","description":"GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are a lot of very good other tools","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/","og_locale":"en_US","og_type":"article","og_title":"GitMonitor : A Github Scanning System 2020!Kalilinuxtutorials","og_description":"GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are a lot of very good other tools","og_url":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-06-19T05:51:08+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"GitMonitor : A Github Scanning System To Look For Leaked Sensitive Information Based On Rules","datePublished":"2020-06-19T05:51:08+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/"},"wordCount":554,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png","keywords":["Github","GitMonitor"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/","url":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/","name":"GitMonitor : A Github Scanning System 2020!Kalilinuxtutorials","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png","datePublished":"2020-06-19T05:51:08+00:00","description":"GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are a lot of very good other tools","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/gitmonitor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/gitmonitor\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-8vvPSa8e9Ak\/XuEvaP9WI5I\/AAAAAAAAGlY\/nUHHpx1l2qU354nerG0IlRiWOszv5bFEwCLcBGAsYHQ\/s1600\/GitMonitor-logo%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":10873,"url":"https:\/\/kalilinuxtutorials.com\/urlcadiz\/","url_meta":{"origin":10784,"position":0},"title":"URLCADIZ : A Simple Script To Generate A Hidden URL For Social Engineering","author":"R K","date":"July 6, 2020","format":false,"excerpt":"URLCADIZ a simple script to generate a hidden url for social engineering. Installing (Tested on Kali Linux 2020.2): git clone https:\/\/github.com\/PerezMascato\/URLCADIZ sudo pip3 install pyshorteners cd URLCADIZ python3 URLCADIZ.py Also Read - GitMonitor : A Github Scanning System To Look For Leaked Sensitive Information Based On Rules Demo https:\/\/www.youtube.com\/watch?v=LwVc4-JkdfA&feature=youtu.be Disclaimer\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/LwVc4-JkdfA\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":10254,"url":"https:\/\/kalilinuxtutorials.com\/git-hound\/","url_meta":{"origin":10784,"position":1},"title":"Git-Hound : PinPoints Exposed API Keys On GitHub Using Pattern Matching","author":"R K","date":"April 14, 2020","format":false,"excerpt":"A batch-catching, pattern-matching, patch-attacking secret snatcher. GitHound pinpoints exposed API keys on GitHub using pattern matching, commit history searching, and a unique result scoring system. A batch-catching, pattern-matching, patch-attacking secret snatcher. Features GitHub\/Gist code searching. This enables GitHound to locate sensitive information exposed across all of GitHub, uploaded by any\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26255,"url":"https:\/\/kalilinuxtutorials.com\/trufflehog-2\/","url_meta":{"origin":10784,"position":2},"title":"Trufflehog : Find Credentials All Over The Place","author":"R K","date":"July 28, 2022","format":false,"excerpt":"TruffleHog v3 is a complete rewrite in Go with many new powerful features. We've\u00a0added over 700 credential detectors that support active verification against their respective APIs.We've also added native\u00a0support for scanning GitHub, GitLab, filesystems, and S3.Instantly verify private keys\u00a0against millions of github users and\u00a0billions\u00a0of TLS certificates using our\u00a0Driftwood\u00a0technology. What is\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgwPls6iugCqmcpj7ifAZHfAVdF0ezqDuFuVSqdmcWCS-cugnM-43kNO7aN6Jv42p4YEDDnVZCg9-Ga4BlQTxOyan8tNuqRKZGZ90z-7FjG3hBaC4qXXdmQaBNHAid0DKeZYPPgQEtNE5N9SbhMmVG3Gw-bbbYSclsVy1uNJt34ptVdKzMZ36HTdcaa\/s728\/68747470733a2f2f73746f726167652e676f6f676c65617069732e636f6d2f74727566666c65686f672d7374617469632d736f75726365732f706978656c5f7069672e706e67%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgwPls6iugCqmcpj7ifAZHfAVdF0ezqDuFuVSqdmcWCS-cugnM-43kNO7aN6Jv42p4YEDDnVZCg9-Ga4BlQTxOyan8tNuqRKZGZ90z-7FjG3hBaC4qXXdmQaBNHAid0DKeZYPPgQEtNE5N9SbhMmVG3Gw-bbbYSclsVy1uNJt34ptVdKzMZ36HTdcaa\/s728\/68747470733a2f2f73746f726167652e676f6f676c65617069732e636f6d2f74727566666c65686f672d7374617469632d736f75726365732f706978656c5f7069672e706e67%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgwPls6iugCqmcpj7ifAZHfAVdF0ezqDuFuVSqdmcWCS-cugnM-43kNO7aN6Jv42p4YEDDnVZCg9-Ga4BlQTxOyan8tNuqRKZGZ90z-7FjG3hBaC4qXXdmQaBNHAid0DKeZYPPgQEtNE5N9SbhMmVG3Gw-bbbYSclsVy1uNJt34ptVdKzMZ36HTdcaa\/s728\/68747470733a2f2f73746f726167652e676f6f676c65617069732e636f6d2f74727566666c65686f672d7374617469632d736f75726365732f706978656c5f7069672e706e67%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgwPls6iugCqmcpj7ifAZHfAVdF0ezqDuFuVSqdmcWCS-cugnM-43kNO7aN6Jv42p4YEDDnVZCg9-Ga4BlQTxOyan8tNuqRKZGZ90z-7FjG3hBaC4qXXdmQaBNHAid0DKeZYPPgQEtNE5N9SbhMmVG3Gw-bbbYSclsVy1uNJt34ptVdKzMZ36HTdcaa\/s728\/68747470733a2f2f73746f726167652e676f6f676c65617069732e636f6d2f74727566666c65686f672d7374617469632d736f75726365732f706978656c5f7069672e706e67%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":28848,"url":"https:\/\/kalilinuxtutorials.com\/noseyparker\/","url_meta":{"origin":10784,"position":3},"title":"Noseyparker : Find Secrets And Sensitive Information In Textual Data And Git History","author":"R K","date":"April 26, 2023","format":false,"excerpt":"Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data. It is useful both for offensive and defensive security testing. Key features: It supports scanning files, directories, and the entire history of Git repositories It uses regular expression matching with a set of 95 patterns\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-4Xl3aptC2jUTpN10Y3wU7qQT2B7qKJpXEdDHUm-5xNoHCMaPkORLh40CdaBf_eDyi6oLsNLj_pNIq_fpZctDcP8rloKA6c2JpuRTyA6X7ECJmRYEsxEEcR077IYuR5H58oE2TyKCi_VUufdxhXHQKLBvFlxlG_Yo6wdwatwF9rP7Du4UkPQW22yL\/s728\/kali%20temp%2810%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-4Xl3aptC2jUTpN10Y3wU7qQT2B7qKJpXEdDHUm-5xNoHCMaPkORLh40CdaBf_eDyi6oLsNLj_pNIq_fpZctDcP8rloKA6c2JpuRTyA6X7ECJmRYEsxEEcR077IYuR5H58oE2TyKCi_VUufdxhXHQKLBvFlxlG_Yo6wdwatwF9rP7Du4UkPQW22yL\/s728\/kali%20temp%2810%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-4Xl3aptC2jUTpN10Y3wU7qQT2B7qKJpXEdDHUm-5xNoHCMaPkORLh40CdaBf_eDyi6oLsNLj_pNIq_fpZctDcP8rloKA6c2JpuRTyA6X7ECJmRYEsxEEcR077IYuR5H58oE2TyKCi_VUufdxhXHQKLBvFlxlG_Yo6wdwatwF9rP7Du4UkPQW22yL\/s728\/kali%20temp%2810%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-4Xl3aptC2jUTpN10Y3wU7qQT2B7qKJpXEdDHUm-5xNoHCMaPkORLh40CdaBf_eDyi6oLsNLj_pNIq_fpZctDcP8rloKA6c2JpuRTyA6X7ECJmRYEsxEEcR077IYuR5H58oE2TyKCi_VUufdxhXHQKLBvFlxlG_Yo6wdwatwF9rP7Du4UkPQW22yL\/s728\/kali%20temp%2810%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":34986,"url":"https:\/\/kalilinuxtutorials.com\/gshark\/","url_meta":{"origin":10784,"position":4},"title":"GShark &#8211; A Comprehensive Guide To Sensitive Information Management System Deployment","author":"Varshini","date":"September 27, 2024","format":false,"excerpt":"The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please refer to articles and videos. For now, all the scans are only targeted to the public environments, not local environments. For the usage of GShark, please refer to\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":20643,"url":"https:\/\/kalilinuxtutorials.com\/whispers\/","url_meta":{"origin":10784,"position":5},"title":"Whispers : Identify Hardcoded Secrets In Static Structured Text","author":"R K","date":"December 7, 2021","format":false,"excerpt":"Whispers is a static code analysis tool designed for parsing various common data formats in search of hardcoded credentials and dangerous functions. Whispers can run in the CLI or you can integrate it in your CI\/CD pipeline. Detects PasswordsAPI tokensAWS keysPrivate keysHashed credentialsAuthentication tokensDangerous functionsSensitive files Supported Formats Whispers is\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh-gUdz8j3Hd7Ukm7xMECs9UneZBDuSkUeqcAm4Q6Sw33_TAYEkGOHZESMCkKIgY4xSo8YjVyBFRDVspVGAtQcoJKELPygysUli6kMoci1WpPsjSQpemvOrXDsL7Wa1xRBvy1Q78OBTVQappglEePGHBenQgGDUtZ0uNXkBcofuasV2P4ScMlXiAmtP=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh-gUdz8j3Hd7Ukm7xMECs9UneZBDuSkUeqcAm4Q6Sw33_TAYEkGOHZESMCkKIgY4xSo8YjVyBFRDVspVGAtQcoJKELPygysUli6kMoci1WpPsjSQpemvOrXDsL7Wa1xRBvy1Q78OBTVQappglEePGHBenQgGDUtZ0uNXkBcofuasV2P4ScMlXiAmtP=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh-gUdz8j3Hd7Ukm7xMECs9UneZBDuSkUeqcAm4Q6Sw33_TAYEkGOHZESMCkKIgY4xSo8YjVyBFRDVspVGAtQcoJKELPygysUli6kMoci1WpPsjSQpemvOrXDsL7Wa1xRBvy1Q78OBTVQappglEePGHBenQgGDUtZ0uNXkBcofuasV2P4ScMlXiAmtP=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh-gUdz8j3Hd7Ukm7xMECs9UneZBDuSkUeqcAm4Q6Sw33_TAYEkGOHZESMCkKIgY4xSo8YjVyBFRDVspVGAtQcoJKELPygysUli6kMoci1WpPsjSQpemvOrXDsL7Wa1xRBvy1Q78OBTVQappglEePGHBenQgGDUtZ0uNXkBcofuasV2P4ScMlXiAmtP=s728 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10784"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10784\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16356"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}