GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are a lot of very good other tools for finding sensitive information leaked on Github right now, I myself currently still use some of them. However, I think they still lack some features like:
- A scanning tool based on the rules.
- The rules mechanism allows me to write rules in the most flexible way possible. The rules allow me to filter information by brand name, file format and by language. As well as allowing me to skip specific file formats and languages (Searching rules). Then clone the repositories that have matched the rules to local before start looking for the sensitive information that exists there based on regular expressions (Sensitive filtering rules). You can do that by defining keywords related to your company brand name, keywords related to your company's projects, email prefixes, or anything else in the rules.
- The tool can launch on schedule and has a flexible reporting mechanism.
Features
- Search the repository based on rules (Searching rules). You can write rules to search for repositories that may be related to your company. The repositories matching the rules will be cloned to local.
- Use Regex (Sensitive filtering rules) to search for sensitive information that exists in cloned repository, for classification purposes.
- Report via Slack.
- Rules and regex are defined separately
- Users can define rules and regex easily and intuitively.
Requirements
- Python3, Python3-pip
Setup
- Install requirements:
Python3 -m pip install -r requirements.txt
- Fill in the required information in the configuration file (config.ini):
[git]
user = <username_git>
pass = <password_git>
url_code = https://api.github.com/search/code?q={}+in:file&sort=indexed&order=desc
url_repos = https://api.github.com/search/repositories?q={}+size:>0+is:public&sort=indexed&order=desc
url_commit = https://api.github.com/search/commits?q={}+is:public&sort=indexed&order=desc
rpp = 50
[slack]
webhooks = <full_link_webhooks>
[path]
rule = <path to rule folder>
source = <path to folder to clone repository>
log = <filename of log>
[msg]
start = ====================**********====================
*Start scanning at {}*
_Clone completed successfully:_
end = ====================**********====================
*Scanning Done at {} *
_Detected possible repository:_
all = ====================**********====================
- Write the rules (Searching rules). Put your rules in the rules directory:
id: Project_X_Matching
key: X
language:
- java
#filename:
# - LICENSE
#extension:
# - py
# - md
ignore:
# language:
# - php
filename:
- LICENSE
extension:
- html
- txt
- Define the regular expressions in libs/regex.py file (Sensitive filtering rules).
- Run:
Python3 gitmonitor.py
- You can schedule automatic running for the tool by using Cronjob.
My Team
- Tony - Project Lead
- musashi137 - Core Dev
Special Thanks
- GitMAD for regex-based sensitive information search mechanism
via KitPloit Related posts
- Hacking Growth
- Pentest Enumeration
- Hacking Hardware
- Pentest Stages
- Pentest Practice
- Pentest Ubuntu
- Hacking Vpn
- Pentest Cyber Security
- Pentest Ubuntu
- Hacking Health
- Pentest Iso
- Pentest Bootcamp
- Pentest Report
- Hacking Meaning
- Pentestgeek
- Pentest +
- Pentest Website
- Pentest Lab Setup
- Pentest Software
- Pentestlab
Nessun commento:
Posta un commento