{"id":5914,"date":"2019-07-23T22:07:55","date_gmt":"2019-07-23T16:37:55","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=5914"},"modified":"2019-07-23T22:07:55","modified_gmt":"2019-07-23T16:37:55","slug":"git-hound-exposed-keys-across-github","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/","title":{"rendered":"Git Hound &#8211; Find Exposed Keys Across GitHub Using Code Search Keywords"},"content":{"rendered":"\n<p><strong>Git Hound<\/strong> makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring system. <\/p>\n\n\n\n<p>This differs from other OSINT GitHub scanners by searching keywords across GitHub rather than targeting specific repositories, exposing a fundamentally different set of results.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/michenriksen\/gitrob\">GitRob<\/a>&nbsp;is an excellent tool that specifically targets an organization or user&#8217;s owned repositories for secrets. A pattern-matching, batch-catching secret snatcher.&nbsp;<strong>This project is intended to be used for educational purposes.<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<p><code><strong>echo \"tillsongalloway.com\" | python git-hound.py<\/strong><\/code>&nbsp;or&nbsp;<code><strong>python git-hound.py --subdomain-file subdomains.txt<\/strong><\/code>&nbsp;We also offer a number of flags to target specific patterns (known service API keys), file names (.htpasswd, .env), and languages (python, javascript).<\/p>\n\n\n\n<p style=\"text-align:center\"><strong>Also Read  &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/fake-sandbox-script-fake-processes-vm\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Fake Sandbox : Script To Simulate Fake Processes Of Analysis Sandbox\/VM (opens in a new tab)\">Fake Sandbox : Script To Simulate Fake Processes Of Analysis Sandbox\/VM<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/tillson\/git-hound#flags\"><\/a><strong>Flags<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>--subdomain-file<\/strong><\/code>&nbsp;&#8211; The file with the subdomains<\/li><li><code><strong>--api-keys<\/strong><\/code>&nbsp;&#8211; Enable generic API key searching. This uses common API key patterns and Shannon entropy to find potential exposed API keys.<\/li><li><code><strong>--output<\/strong><\/code>&nbsp;&#8211; The output file (default is stdout)<\/li><li><code><strong>--output-type<\/strong><\/code>&nbsp;&#8211; The output type (requires output flag to be set; default is flatfile)<\/li><li><code><strong>--many-results<\/strong><\/code>&nbsp;&#8211; Use result sorting to scrape more than 100 pages of results<\/li><li><code><strong>--results-only<\/strong><\/code>&nbsp;&#8211; Print only regexed results to stdout. Useful for piping into another script<\/li><li><code><strong>--all<\/strong><\/code>&nbsp;&#8211; Print all URLs, including ones with no pattern match. Otherwise, the scoring system will do the work.<\/li><li><code><strong>--regex-file<\/strong><\/code>&nbsp;&#8211; Supply a custom regex file<\/li><li><code><strong>--language-file<\/strong><\/code>&nbsp;&#8211; Supply a custom file with languages to search.<\/li><li><code><strong>--config-file<\/strong><\/code>&nbsp;&#8211; Custom config file (default is&nbsp;<code>config.yml<\/code>)<\/li><li><code><strong>--pages<\/strong><\/code>&nbsp;&#8211; Max pages to search (default is 100, the page maximum)<\/li><li><code><strong>--silent<\/strong><\/code>&nbsp;&#8211; Don&#8217;t print results to stdout (most reasonably used with &#8211;output).<\/li><li><code><strong>--no-antikeywords<\/strong><\/code>&nbsp;&#8211; Don&#8217;t attempt to filter out known mass scans<\/li><li><code><strong>--only-filtered<\/strong><\/code>&nbsp;&#8211; Only search filtered queries (languages, file extensions)<\/li><li><code><strong>--debug<\/strong><\/code>&nbsp;&#8211; Print debug messages. Helpful for debugging slow expressions.<\/li><\/ul>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/tillson\/git-hound#setup\"><\/a><strong>Setup<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Clone this repo<\/li><li>Use a Python 3 environment (recommended: virtulenv or&nbsp;<a href=\"https:\/\/docs.conda.io\/en\/latest\/\">Conda<\/a>)<\/li><li><code><strong>pip install -r requirements.txt<\/strong><\/code><strong>&nbsp;(or&nbsp;<\/strong><code><strong>pip3<\/strong><\/code>)<\/li><li>Set up a&nbsp;<code><strong>config.yml<\/strong><\/code>&nbsp;file with GitHub credentials. See&nbsp;<a href=\"https:\/\/github.com\/tillson\/git-hound\/blob\/master\/config.example.yml\">config.example.yml<\/a>&nbsp;for an example. Accounts with 2FA are not currently supported.<\/li><li><code><strong>echo \"tillsongalloway.com\" | python git-hound.py<\/strong><\/code><\/li><\/ul>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/tillson\/git-hound\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring system. This differs from other OSINT GitHub scanners by searching keywords across GitHub rather than targeting specific repositories, exposing a fundamentally different set of results.&nbsp; GitRob&nbsp;is an excellent tool that specifically targets an organization or [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15698,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png","fifu_image_alt":"Git Hound \u2013 Find Exposed Keys Across GitHub Using Code Search Keywords","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1132,1331,1338],"class_list":["post-5914","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-exposed-keys","tag-git-hound","tag-github"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Git Hound - Find Exposed Keys Across GitHub 2019<\/title>\n<meta name=\"description\" content=\"Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring system.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Git Hound - Find Exposed Keys Across GitHub 2019\" \/>\n<meta property=\"og:description\" content=\"Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-23T16:37:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Git Hound &#8211; Find Exposed Keys Across GitHub Using Code Search Keywords\",\"datePublished\":\"2019-07-23T16:37:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/\"},\"wordCount\":352,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png\",\"keywords\":[\"Exposed Keys\",\"Git Hound\",\"Github\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/\",\"name\":\"Git Hound - Find Exposed Keys Across GitHub 2019\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png\",\"datePublished\":\"2019-07-23T16:37:55+00:00\",\"description\":\"Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring system.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Git Hound - Find Exposed Keys Across GitHub 2019","description":"Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring system.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/","og_locale":"en_US","og_type":"article","og_title":"Git Hound - Find Exposed Keys Across GitHub 2019","og_description":"Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring system.","og_url":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-07-23T16:37:55+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Git Hound &#8211; Find Exposed Keys Across GitHub Using Code Search Keywords","datePublished":"2019-07-23T16:37:55+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/"},"wordCount":352,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png","keywords":["Exposed Keys","Git Hound","Github"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/","url":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/","name":"Git Hound - Find Exposed Keys Across GitHub 2019","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png","datePublished":"2019-07-23T16:37:55+00:00","description":"Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring system.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-U7_9djbF12E\/XTV8TUbXjXI\/AAAAAAAABew\/VkVbJ1tgSBgb8scW48j0kCj4u8wcd01KgCLcBGAs\/s1600\/Git%2BHound%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":10254,"url":"https:\/\/kalilinuxtutorials.com\/git-hound\/","url_meta":{"origin":5914,"position":0},"title":"Git-Hound : PinPoints Exposed API Keys On GitHub Using Pattern Matching","author":"R K","date":"April 14, 2020","format":false,"excerpt":"A batch-catching, pattern-matching, patch-attacking secret snatcher. GitHound pinpoints exposed API keys on GitHub using pattern matching, commit history searching, and a unique result scoring system. A batch-catching, pattern-matching, patch-attacking secret snatcher. Features GitHub\/Gist code searching. This enables GitHound to locate sensitive information exposed across all of GitHub, uploaded by any\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31589,"url":"https:\/\/kalilinuxtutorials.com\/gitalerts\/","url_meta":{"origin":5914,"position":1},"title":"GitAlerts: Enhancing GitHub Security and Monitoring for Organization Repositories","author":"Varshini","date":"December 27, 2023","format":false,"excerpt":"GitHub has become an important tool for version control and project management in the ever-changing world of software development and teamwork. GitHub is used by organizations and developers all over the world to store their repositories, work together on code, and keep track of their software projects. But, as the\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEis8wNnSE8fZSMiLLi83_B9SRw8rXCvyJVVO9cqc7AQfkPVu6j-O8uZzDAFGFWe6tCOUuI2pJXL8VX5bT2ytc2XFHtMcYwiAOmwRWd_xKQyc4b1U6v8HoQNlkXEiWu_LtxJMAvPQdC830fl5b22lRb453_9I6PYFyZNuhV125Opaw28-yM9fqUByGTd0A\/s16000\/github.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEis8wNnSE8fZSMiLLi83_B9SRw8rXCvyJVVO9cqc7AQfkPVu6j-O8uZzDAFGFWe6tCOUuI2pJXL8VX5bT2ytc2XFHtMcYwiAOmwRWd_xKQyc4b1U6v8HoQNlkXEiWu_LtxJMAvPQdC830fl5b22lRb453_9I6PYFyZNuhV125Opaw28-yM9fqUByGTd0A\/s16000\/github.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEis8wNnSE8fZSMiLLi83_B9SRw8rXCvyJVVO9cqc7AQfkPVu6j-O8uZzDAFGFWe6tCOUuI2pJXL8VX5bT2ytc2XFHtMcYwiAOmwRWd_xKQyc4b1U6v8HoQNlkXEiWu_LtxJMAvPQdC830fl5b22lRb453_9I6PYFyZNuhV125Opaw28-yM9fqUByGTd0A\/s16000\/github.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEis8wNnSE8fZSMiLLi83_B9SRw8rXCvyJVVO9cqc7AQfkPVu6j-O8uZzDAFGFWe6tCOUuI2pJXL8VX5bT2ytc2XFHtMcYwiAOmwRWd_xKQyc4b1U6v8HoQNlkXEiWu_LtxJMAvPQdC830fl5b22lRb453_9I6PYFyZNuhV125Opaw28-yM9fqUByGTd0A\/s16000\/github.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEis8wNnSE8fZSMiLLi83_B9SRw8rXCvyJVVO9cqc7AQfkPVu6j-O8uZzDAFGFWe6tCOUuI2pJXL8VX5bT2ytc2XFHtMcYwiAOmwRWd_xKQyc4b1U6v8HoQNlkXEiWu_LtxJMAvPQdC830fl5b22lRb453_9I6PYFyZNuhV125Opaw28-yM9fqUByGTd0A\/s16000\/github.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEis8wNnSE8fZSMiLLi83_B9SRw8rXCvyJVVO9cqc7AQfkPVu6j-O8uZzDAFGFWe6tCOUuI2pJXL8VX5bT2ytc2XFHtMcYwiAOmwRWd_xKQyc4b1U6v8HoQNlkXEiWu_LtxJMAvPQdC830fl5b22lRb453_9I6PYFyZNuhV125Opaw28-yM9fqUByGTd0A\/s16000\/github.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":11706,"url":"https:\/\/kalilinuxtutorials.com\/thecl0n3r\/","url_meta":{"origin":5914,"position":2},"title":"TheCl0n3r : Tool To Download &#038; Manage Your Git Repositories","author":"R K","date":"October 26, 2020","format":false,"excerpt":"TheCl0n3r will allow you to download and manage your git repositories. About 90% of the penetration testing tools used in my experience can be found primarily on github. The aim of this was to make it easier to download, update and delete these git repositories. If moving to a new\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5987,"url":"https:\/\/kalilinuxtutorials.com\/airopy-wireless-packet-capture\/","url_meta":{"origin":5914,"position":3},"title":"Airopy : Get Clients And Access Points","author":"R K","date":"July 30, 2019","format":false,"excerpt":"Airopy is a wireless packet capture to get clients and access points. With Alfa cards this script works correctly. Dependencies To run this script first install requirements as follows: sudo pip3 install requirements.txt How To Use In the examples I don't add 'sudo', but to execute them you need high\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31120,"url":"https:\/\/kalilinuxtutorials.com\/social-media-osint-tools-collection\/","url_meta":{"origin":5914,"position":4},"title":"Social-Media-OSINT-Tools-Collection &#8211; A Powerful Toolkit","author":"Varshini","date":"November 2, 2023","format":false,"excerpt":"A collection of most useful tools for social media osint. Unlock the potential of Open-Source Intelligence (OSINT) with our curated 'Social-Media-OSINT-Tools-Collection.' Dive into a world of powerful tools designed to gather valuable information from social media platforms like Facebook, Instagram, LinkedIn, Twitter, and more. Discover how these tools can empower\u2026","rel":"","context":"In &quot;Information Gathering&quot;","block_context":{"text":"Information Gathering","link":"https:\/\/kalilinuxtutorials.com\/category\/ig\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":28848,"url":"https:\/\/kalilinuxtutorials.com\/noseyparker\/","url_meta":{"origin":5914,"position":5},"title":"Noseyparker : Find Secrets And Sensitive Information In Textual Data And Git History","author":"R K","date":"April 26, 2023","format":false,"excerpt":"Nosey Parker is a command-line tool that finds secrets and sensitive information in textual data. It is useful both for offensive and defensive security testing. Key features: It supports scanning files, directories, and the entire history of Git repositories It uses regular expression matching with a set of 95 patterns\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-4Xl3aptC2jUTpN10Y3wU7qQT2B7qKJpXEdDHUm-5xNoHCMaPkORLh40CdaBf_eDyi6oLsNLj_pNIq_fpZctDcP8rloKA6c2JpuRTyA6X7ECJmRYEsxEEcR077IYuR5H58oE2TyKCi_VUufdxhXHQKLBvFlxlG_Yo6wdwatwF9rP7Du4UkPQW22yL\/s728\/kali%20temp%2810%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-4Xl3aptC2jUTpN10Y3wU7qQT2B7qKJpXEdDHUm-5xNoHCMaPkORLh40CdaBf_eDyi6oLsNLj_pNIq_fpZctDcP8rloKA6c2JpuRTyA6X7ECJmRYEsxEEcR077IYuR5H58oE2TyKCi_VUufdxhXHQKLBvFlxlG_Yo6wdwatwF9rP7Du4UkPQW22yL\/s728\/kali%20temp%2810%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-4Xl3aptC2jUTpN10Y3wU7qQT2B7qKJpXEdDHUm-5xNoHCMaPkORLh40CdaBf_eDyi6oLsNLj_pNIq_fpZctDcP8rloKA6c2JpuRTyA6X7ECJmRYEsxEEcR077IYuR5H58oE2TyKCi_VUufdxhXHQKLBvFlxlG_Yo6wdwatwF9rP7Du4UkPQW22yL\/s728\/kali%20temp%2810%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh-4Xl3aptC2jUTpN10Y3wU7qQT2B7qKJpXEdDHUm-5xNoHCMaPkORLh40CdaBf_eDyi6oLsNLj_pNIq_fpZctDcP8rloKA6c2JpuRTyA6X7ECJmRYEsxEEcR077IYuR5H58oE2TyKCi_VUufdxhXHQKLBvFlxlG_Yo6wdwatwF9rP7Du4UkPQW22yL\/s728\/kali%20temp%2810%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=5914"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5914\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15698"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=5914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=5914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=5914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}