Find leaked information in different kind of services
Stay tuned for updates - under heavy development
leaked is a toolkit to find sensitive and security relevant information in different kind of sources.
These sources are implemented as extensible providers. In order to find sensitive information in these providers there are a bunch of modules. Each module contains information to the according service the information belongs to and one or more search terms.
Examples for providers are:
- Local Repository
Examples for Modules are:
- RSA private keys
- System Credentials
- A beautiful command-line interface thanks to click.
- Implemented to be easily extensible.
$ leaked gather -p github -m wordpress
$ leaked providers
$ leaked modules
Due to some asynchronous requests to GitHub it triggers a abuse detection mechanism and no further requests are possible for a specific amount of time.
leaked is released under the MIT License. See the bundled LICENSE file for details.
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
|Filename, size||File type||Python version||Upload date||Hashes|
|Filename, size leaked-0.0.3.tar.gz (6.5 kB)||File type Source||Python version None||Upload date||Hashes View|