Skip to main content

Find leaked information in different kind of services

Project description

Latest version released on PyPi Package license

Stay tuned for updates - under heavy development

leaked is a toolkit to find sensitive and security relevant information in different kind of sources.

These sources are implemented as extensible providers. In order to find sensitive information in these providers there are a bunch of modules. Each module contains information to the according service the information belongs to and one or more search terms.

Examples for providers are:

  • GitHub

  • Local Repository

Examples for Modules are:

  • FTP

  • WordPress

  • RSA private keys

  • System Credentials

Features

  • A beautiful command-line interface thanks to click.

  • Implemented to be easily extensible.

Documentation

Gather information:

$ leaked gather -p github -m wordpress

Show providers:

$ leaked providers

Show modules:

$ leaked modules

Known Issues

Due to some asynchronous requests to GitHub it triggers a abuse detection mechanism and no further requests are possible for a specific amount of time.

License

leaked is released under the MIT License. See the bundled LICENSE file for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

leaked-0.0.3.tar.gz (6.5 kB view hashes)

Uploaded Source

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page