{"id":28523,"date":"2023-02-28T06:02:08","date_gmt":"2023-02-28T06:02:08","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=28523"},"modified":"2023-02-28T06:02:12","modified_gmt":"2023-02-28T06:02:12","slug":"leaktopus","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/leaktopus\/","title":{"rendered":"Leaktopus &#8211; To Keep Your Source Code Under Control"},"content":{"rendered":"\n<p><strong>Leaktopus  <\/strong>is a tool to keep your source code under control.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Key Features<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Plug&amp;Play<\/strong> &#8211; one line installation with Docker.<\/li>\n\n\n\n<li><strong>Scan various sources<\/strong> containing a set of keywords, e.g. <code>ORGANIZATION-NAME.com<\/code>. <\/li>\n<\/ul>\n\n\n\n<p>Currently supports:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li> GitHub\n<ul class=\"wp-block-list\">\n<li>Repositories<\/li>\n\n\n\n<li>Gists <em>(coming soon)<\/em><\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Paste sites (e.g., PasteBin) <em>(coming soon)<\/em><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Filter results<\/strong> with a built-in heuristic engine.<\/li>\n\n\n\n<li><strong>Enhance results with IOLs<\/strong> (Indicators Of Leak):\n<ul class=\"wp-block-list\">\n<li>Secrets in the found sources (including Git repos commits history):\n<ul class=\"wp-block-list\">\n<li>With <a href=\"https:\/\/github.com\/eth0izzle\/shhgit\">Shhgit<\/a> (using a customized rules list).<\/li>\n\n\n\n<li>With <a href=\"https:\/\/github.com\/trufflesecurity\/trufflehog\">TruffleHog<\/a>.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>URIs (Including indication of your organization&#8217;s domains)<\/li>\n\n\n\n<li>Emails (Including indication of your organization&#8217;s email addresses)<\/li>\n\n\n\n<li>Contributors<\/li>\n\n\n\n<li>Sensitive keywords (e.g., canary token, internal domains)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Allows to <strong>ignore<\/strong> public sources, (e.g., &#8220;junk&#8221; repositories by web crawlers).<\/li>\n\n\n\n<li><strong>OOTB ignore list<\/strong> of common &#8220;junk&#8221; sources.<\/li>\n\n\n\n<li><strong>Acknowledge a leak<\/strong>, and only get notified if the source has been modified since the previous scan.<\/li>\n\n\n\n<li><strong>Built-in ELK<\/strong> to search for data in leaks (including full index of Git repositories with IOLs).<\/li>\n\n\n\n<li><strong>Notify on new leaks<\/strong>\n<ul class=\"wp-block-list\">\n<li>MS Teams Webhook.<\/li>\n\n\n\n<li>Slack Bot.<\/li>\n\n\n\n<li>Cortex XSOAR\u00ae (by Palo Alto Networks) Integration <em>(WIP)<\/em>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/PlaytikaOSS\/Leaktopus#technology-stack\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Technology Stack<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fully Dockerized.<\/li>\n\n\n\n<li>API-first Python Flask backend.<\/li>\n\n\n\n<li>Decoupled Vue.js (3.x) frontend.<\/li>\n\n\n\n<li>SQLite DB.<\/li>\n\n\n\n<li>Async tasks with Celery + Redis queues.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/PlaytikaOSS\/Leaktopus#prerequisites\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Prerequisites<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Docker-Compose<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/PlaytikaOSS\/Leaktopus#installation\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Installation<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Clone the repository<\/li>\n\n\n\n<li>Create a local .env file cd Leaktopus cp .env.example .env<\/li>\n\n\n\n<li>Edit .env according to your local setup (see the internal comments).<\/li>\n\n\n\n<li>Run Leaktopus docker-compose up -d<\/li>\n\n\n\n<li>Initiate the installation sequence by accessing the installation API. Just open http:\/\/{LEAKTOPUS_HOST}:8000\/api\/install in your browser.<\/li>\n\n\n\n<li>Check that the API is up and running at http:\/\/{LEAKTOPUS_HOST}:8000\/up<\/li>\n\n\n\n<li>The UI should be available at http:\/\/{LEAKTOPUS_HOST}:8080<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/PlaytikaOSS\/Leaktopus#using-github-app\"><\/a><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Using Github App<\/strong><\/h3>\n\n\n\n<p>In addition to the basic personal access token option, Leaktopus supports Github App authentication. Using Github App is recommended due to the increased rate limits.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>To use Github App authentication, you need to create a Github App and install it on your organization\/account. See <a href=\"https:\/\/docs.github.com\/en\/developers\/apps\/creating-a-github-app\">Github&#8217;s documentation<\/a> for more details.<\/li>\n\n\n\n<li>After creating the app, you need to set the following environment variables:\n<ul class=\"wp-block-list\">\n<li><code>GITHUB_USE_APP=True<\/code><\/li>\n\n\n\n<li><code>GITHUB_APP_ID<\/code><\/li>\n\n\n\n<li><code>GITHUB_INSTALLATION_ID<\/code> &#8211; The installation id can be found in <a href=\"https:\/\/stackoverflow.com\/a\/74474953\/533842\">your app installation<\/a>.<\/li>\n\n\n\n<li><code>GITHUB_APP_PRIVATE_KEY_PATH<\/code> (defaults to <code>\/app\/private-key.pem<\/code>)<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Mount the private key file to the container (see <code>docker-compose.yml<\/code> for an example). <code>.\/leaktopus_backend\/private-key.pem:\/app\/private-key.pem<\/code><\/li>\n<\/ol>\n\n\n\n<p><em>* Note that <code>GITHUB_ACCESS_TOKEN<\/code> will be ignored if <code>GITHUB_USE_APP<\/code> is set to <code>True<\/code>.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/PlaytikaOSS\/Leaktopus#updating-leaktopus\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Updating Leaktopus<\/h2>\n\n\n\n<p>If you wish to update your Leaktopus version (pulling a newer version), just follow the next steps.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pull the latest version. git pull<\/li>\n\n\n\n<li>Rebuild Docker images (data won&#8217;t be deleted). # Force image recreation docker-compose up &#8211;force-recreate &#8211;build<\/li>\n\n\n\n<li>Run the DB update by calling its API (should be required after some updates). http:\/\/{LEAKTOPUS_HOST}\/api\/updatedb<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/PlaytikaOSS\/Leaktopus#results-filtering-heuristic-engine\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Results Filtering Heuristic Engine<\/h2>\n\n\n\n<p>The built-in heuristic engine is filtering the search results to reduce false positives by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Content:\n<ul class=\"wp-block-list\">\n<li>More than X emails containing non-organizational domains.<\/li>\n\n\n\n<li>More than X URIs containing non-organizational domains.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Metadata:\n<ul class=\"wp-block-list\">\n<li>More than X stars.<\/li>\n\n\n\n<li>More than X forks.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Sources ignore list.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/PlaytikaOSS\/Leaktopus#api-documentation\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">API Documentation<\/h2>\n\n\n\n<p>OpenAPI documentation is available in http:\/\/{LEAKTOPUS_HOST}:8000\/apidocs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/PlaytikaOSS\/Leaktopus#leaktopus-services\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Leaktopus Services<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Service<\/th><th>Port<\/th><th>Mandatory\/Optional<\/th><\/tr><\/thead><tbody><tr><td>Backend (API)<\/td><td>8000<\/td><td>Mandatory<\/td><\/tr><tr><td>Backend (Worker)<\/td><td>N\/A<\/td><td>Mandatory<\/td><\/tr><tr><td>Redis<\/td><td>6379<\/td><td>Mandatory<\/td><\/tr><tr><td>Frontend<\/td><td>8080<\/td><td>Optional<\/td><\/tr><tr><td>Elasticsearch<\/td><td>9200<\/td><td>Optional<\/td><\/tr><tr><td>Logstash<\/td><td>5000<\/td><td>Optional<\/td><\/tr><tr><td>Kibana<\/td><td>5601<\/td><td>Optional<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><em>The above can be customized by using a custom docker-compose.yml file.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/PlaytikaOSS\/Leaktopus#security-notes\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:italic;font-weight:600\">Security Notes<\/h2>\n\n\n\n<p>As for now, Leaktopus does not provide any authentication mechanism. Make sure that you are not exposing it to the world, and doing your best to <strong>restrict access to your Leaktopus instance(s)<\/strong>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/github.com\/PlaytikaOSS\/Leaktopus\" target=\"_blank\" rel=\"noreferrer noopener\">Click Here To Download<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Leaktopus is a tool to keep your source code under control. Key Features Currently supports: Technology Stack Prerequisites Installation Using Github App In addition to the basic personal access token option, Leaktopus supports Github App authentication. Using Github App is recommended due to the increased rate limits. * Note that GITHUB_ACCESS_TOKEN will be ignored if [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28527,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[5918,5917],"class_list":["post-28523","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-installation-with-docker","tag-leaktopus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Leaktopus - To Keep Your Source Code Under Control<\/title>\n<meta name=\"description\" content=\"Leaktopus is to Keep Your Source Code Under Control . Key features are Plug&amp;Play - one line installation with Docker.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/leaktopus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Leaktopus - To Keep Your Source Code Under Control\" \/>\n<meta property=\"og:description\" content=\"Leaktopus is to Keep Your Source Code Under Control . Key features are Plug&amp;Play - one line installation with Docker.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/leaktopus\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-28T06:02:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-28T06:02:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/leaktopus\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/leaktopus\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Leaktopus &#8211; To Keep Your Source Code Under Control\",\"datePublished\":\"2023-02-28T06:02:08+00:00\",\"dateModified\":\"2023-02-28T06:02:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/leaktopus\/\"},\"wordCount\":568,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/leaktopus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png\",\"keywords\":[\"installation with Docker\",\"Leaktopus\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/leaktopus\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/leaktopus\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/leaktopus\/\",\"name\":\"Leaktopus - To Keep Your Source Code Under Control\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/leaktopus\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/leaktopus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png\",\"datePublished\":\"2023-02-28T06:02:08+00:00\",\"dateModified\":\"2023-02-28T06:02:12+00:00\",\"description\":\"Leaktopus is to Keep Your Source Code Under Control . Key features are Plug&Play - one line installation with Docker.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/leaktopus\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/leaktopus\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Leaktopus - To Keep Your Source Code Under Control","description":"Leaktopus is to Keep Your Source Code Under Control . Key features are Plug&Play - one line installation with Docker.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/leaktopus\/","og_locale":"en_US","og_type":"article","og_title":"Leaktopus - To Keep Your Source Code Under Control","og_description":"Leaktopus is to Keep Your Source Code Under Control . Key features are Plug&Play - one line installation with Docker.","og_url":"https:\/\/kalilinuxtutorials.com\/leaktopus\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-02-28T06:02:08+00:00","article_modified_time":"2023-02-28T06:02:12+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/leaktopus\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/leaktopus\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Leaktopus &#8211; To Keep Your Source Code Under Control","datePublished":"2023-02-28T06:02:08+00:00","dateModified":"2023-02-28T06:02:12+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/leaktopus\/"},"wordCount":568,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/leaktopus\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png","keywords":["installation with Docker","Leaktopus"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/leaktopus\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/leaktopus\/","url":"https:\/\/kalilinuxtutorials.com\/leaktopus\/","name":"Leaktopus - To Keep Your Source Code Under Control","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/leaktopus\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/leaktopus\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png","datePublished":"2023-02-28T06:02:08+00:00","dateModified":"2023-02-28T06:02:12+00:00","description":"Leaktopus is to Keep Your Source Code Under Control . Key features are Plug&Play - one line installation with Docker.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/leaktopus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/leaktopus\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAY98-MEETFnhCqTCKduE7SunSd_p-XqChl-1BJXBS3RUb_59kn6zXZ0WCkU3Ay1Yq1ENJlqohoJ_OBFmJN7M03jwMuzxY1k6BsTCz6FhYYYuQP3Tk-ORSqonOU0kzO2-TEk6P3sJrEghbTJnv43kTmywOT5Uj_O9vQMb-dmU5ZZIlW7immYOlfviP\/s16000\/logo-128.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":23921,"url":"https:\/\/kalilinuxtutorials.com\/scanmycode-ce\/","url_meta":{"origin":28523,"position":0},"title":"Scanmycode-Ce : Code Scanning\/SAST\/Static Analysis\/Linting Using Many tools\/Scanners","author":"R K","date":"April 12, 2022","format":false,"excerpt":"Scanmycode-Ce is a Code Scanning\/SAST\/Static Analysis\/Linting solution using many tools\/Scanners with One Report. You can also add any tool to it. Currently, it supports many languages and tech stacks. Similar to SonarQube, but it is different. Fig. 1 Scanmycode concept diagram TLDR To install it. Install\u00a0docker\u00a0and\u00a0docker-compose\u00a0and then: 2 options Fastest\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6SwG6inXrB2U3RbKfd8oEUqIW-bWpygwLnWuo_uwMagQRYp_9KQvRrrd3v8itVgKiN7jOkWXPZ2jt8VbNQr4_RUg7lxKCYsHVRMPd2ZNU44F1AK6wDRFRJ4306E1X2UImG8634sorKbw5PMHRM23y5J1PPGB0be0CvqahrmWaEqJNt80bWJbxvRLB\/s728\/logo-svg.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6SwG6inXrB2U3RbKfd8oEUqIW-bWpygwLnWuo_uwMagQRYp_9KQvRrrd3v8itVgKiN7jOkWXPZ2jt8VbNQr4_RUg7lxKCYsHVRMPd2ZNU44F1AK6wDRFRJ4306E1X2UImG8634sorKbw5PMHRM23y5J1PPGB0be0CvqahrmWaEqJNt80bWJbxvRLB\/s728\/logo-svg.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6SwG6inXrB2U3RbKfd8oEUqIW-bWpygwLnWuo_uwMagQRYp_9KQvRrrd3v8itVgKiN7jOkWXPZ2jt8VbNQr4_RUg7lxKCYsHVRMPd2ZNU44F1AK6wDRFRJ4306E1X2UImG8634sorKbw5PMHRM23y5J1PPGB0be0CvqahrmWaEqJNt80bWJbxvRLB\/s728\/logo-svg.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6SwG6inXrB2U3RbKfd8oEUqIW-bWpygwLnWuo_uwMagQRYp_9KQvRrrd3v8itVgKiN7jOkWXPZ2jt8VbNQr4_RUg7lxKCYsHVRMPd2ZNU44F1AK6wDRFRJ4306E1X2UImG8634sorKbw5PMHRM23y5J1PPGB0be0CvqahrmWaEqJNt80bWJbxvRLB\/s728\/logo-svg.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":8815,"url":"https:\/\/kalilinuxtutorials.com\/obfuscapk\/","url_meta":{"origin":28523,"position":1},"title":"Obfuscapk : Black-Box Obfuscation Tool For Android Apps","author":"R K","date":"February 5, 2020","format":false,"excerpt":"Obfuscapk\u00a0is a modular Python tool for obfuscating Android apps without needing their source code, since\u00a0apktool\u00a0is used to decompile the original apk file and to build a new application, after applying some obfuscation techniques on the de-compiled smali\u00a0code, resources and manifest. The obfuscated app retains the same functionality as the original\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6584,"url":"https:\/\/kalilinuxtutorials.com\/act-platform-semi-automated-cyber-threat-intelligence\/","url_meta":{"origin":28523,"position":2},"title":"Act Platform : Open Platform For Collection &#038; Exchange Of Threat Intelligence Information","author":"R K","date":"September 21, 2019","format":false,"excerpt":"Semi-Automated Cyber Threat Intelligence or ACT is a research project led by mnemonic as with contributions from the University of Oslo, NTNU, Norwegian Security Authority (NSM), KraftCERT and Nordic Financial CERT. The main objective of the ACT project is to develop a platform for cyber threat intelligence to uncover cyber\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3295,"url":"https:\/\/kalilinuxtutorials.com\/ache-web-crawler-domain\/","url_meta":{"origin":28523,"position":3},"title":"Ache &#8211; Web Crawler For Domain-Specific Search","author":"R K","date":"November 27, 2018","format":false,"excerpt":"ACHE is a focused web crawler. It collects web pages that satisfy some specific criteria, e.g., pages that belong to a given domain or that contain a user-specified pattern. ACHE differs from generic crawlers in sense that it uses page classifiers to distinguish between relevant and irrelevant pages in a\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":11975,"url":"https:\/\/kalilinuxtutorials.com\/freki\/","url_meta":{"origin":28523,"position":4},"title":"Freki : Malware Analysis Platform","author":"R K","date":"December 22, 2020","format":false,"excerpt":"Freki is a free and open-source malware analysis platform. Goals Facilitate malware analysis and reverse engineering;Provide an easy-to-use REST API for different projects;Easy deployment (via Docker);Allow the addition of new features by the community. Current Features Hash extraction.VirusTotal API queries.Static analysis of PE files (headers, sections, imports, capabilities, and strings).Pattern\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/AW4afoaogt0\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":5004,"url":"https:\/\/kalilinuxtutorials.com\/mquery\/","url_meta":{"origin":28523,"position":5},"title":"Mquery : YARA Malware Query Accelerator","author":"R K","date":"May 15, 2019","format":false,"excerpt":"Mquery can be used to search through terabytes of malware in a blink of an eye: Ever had trouble searching for particular malware samples? Our project is an analyst-friendly web GUI to look through your digital warehouse. Demo Take a look at https:\/\/mquery.tailcall.net for a quick demo. Unfortunately, you won't\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=28523"}],"version-history":[{"count":5,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28523\/revisions"}],"predecessor-version":[{"id":28530,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28523\/revisions\/28530"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/28527"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=28523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=28523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=28523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}