GoldDigger: a powerful file sensitive information search tool

0 21
Most of the regular expressions used in this project come from d1vious's 【git-wi...

GoldDigger: a powerful file sensitive information search tool

Most of the regular expressions used in this project come from d1vious's 【git-wild-hunt】project.

tool requirements

Python 3

tool installation

Since GoldDigger is developed based on Python 3, we first need to install and configure the Python 3 environment on our local device:

virtualenv -p python3 .

source bin/activate

python dig.py --help

tool download

Researchers can use the following command to clone the source code of this project to their local machine:

git clone https://github.com/ustayready/golddigger.git

tool usage

usage: dig.py [-h] [-e EXCLUDE] [-g GOLD] -d DIRECTORY [-r RECURSIVE] [-l LOG]

 

optional arguments:

-h, --help            show this help message and exit

-e EXCLUDE, --exclude EXCLUDE

JSON file containing extension exclusions

-g GOLD, --gold GOLD   JSON file containing the gold to search for

-d DIRECTORY, --directory DIRECTORY

Directory to search for gold

-r RECURSIVE, --recursive RECURSIVE

Search directory recursively?

-l LOG, --log LOG   Log file to save output

Parameter explanation

-h, --help   Show tool help information and exit

-e EXCLUDE, --exclude EXCLUDE

JSON file containing the extensions to be excluded

-g GOLD, --gold GOLD   JSON file containing the results to be searched

-d DIRECTORY, --directory DIRECTORY

Directory path to search for sensitive information

-r RECURSIVE, --recursive RECURSIVE

Whether to enable the file directory recursive search feature

-l LOG, --log LOG   Output the path of the result log file

Tool usage examples

GoldDigger will first recursively search all directories and attempt to match the content of the files based on the entries in the gold.json file. In addition, we can also use an exclusions.json file to exclude files or extensions that we do not want to search. This tool supports specifying the root directory for recursive search with the --directory parameter option.

The following is an example of the structure of the tool's output:

~/Engagements/CustomerName/data/randomfiles/

~/Engagements/CustomerName/data/randomfiles2/

~/Engagements/CustomerName/data/code/

The following commands can also be provided to parse all three reports:

~/Engagements/CustomerName/data/randomfiles/

~/Engagements/CustomerName/data/randomfiles2/

~/Engagements/CustomerName/data/code/

Run results

This tool will create a log file containing the scan results. Due to the nature of regular expressions, there may be many false positives. Nevertheless, this tool has been proven to increase productivity when processing thousands of files.

Project address

GoldDigger:【GitHub Gateway

Reference materials

https://github.com/d1vious/git-wild-hunt

你可能想看:

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

Instaloctrack: A powerful OSINT open-source intelligence tool for Instagram.

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

A brief discussion on how to ensure the security of information assets during the termination of information systems

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

最后修改时间:
admin
上一篇 2025年03月29日 09:10
下一篇 2025年03月29日 09:32

评论已关闭