Discover files in directories with execute-only permission - C-accelerated with Python fallback
Project description
rfind - Restricted File Finder
.
Overview
rfind is a security and system administration tool designed for situations where you have execute (x) permission on a directory but lack read (r) permission. In such cases, traditional directory listing commands like ls fail with "Permission denied", yet you can still access files if you know their names.
This tool helps you discover what files exist in such restricted directories through intelligent enumeration techniques.
The Problem
On Unix-like systems (including Linux and Android), directory permissions work like this:
- Read (
r) permission: List directory contents - Execute (
x) permission: Access files within the directory (if you know their names) - Both are needed: To both list AND access files
When you have x but not r, you're in a "blind" situation - you can't see what's there, but you can touch what you find.
How rfind Helps
rfind provides several approaches to discover files:
- Smart pattern matching - Common file naming conventions
- Brute-force enumeration - Systematic checking of possible names
- Multi-process scanning - Leverage all CPU cores for speed
- Custom character sets - Tailor searches to specific environments
Use Cases
- Security auditing - Discovering hidden or protected files
- Digital forensics - Investigating system directories
- System administration - Recovering from permission issues
- Penetration testing - Exploring restricted environments
- Android device analysis - Accessing protected system directories
Installation
pip install rfind
Basic Usage
# Scan a directory with limited permissions
rfind /system/bin
# Use smart mode for common patterns
rfind --smart /dev
Technical Details
The tool employs parallel processing to efficiently enumerate possible filenames based on:
· Length constraints (1-6 characters typically) · Character sets (alphanumeric, specific symbols, etc.) · Common naming patterns in Unix/Linux/Android systems
Ethical Use
This tool should only be used on:
· Systems you own or have explicit permission to test · For legitimate security auditing and system administration · Educational and research purposes
Development Status
Early alpha release. Core functionality is implemented with ongoing development for additional features and optimizations.
Contributing
Contributions are welcome! Please feel free to submit a Pull Request.
License
MIT License - see LICENSE file for details.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file rfind-0.2.0.tar.gz.
File metadata
- Download URL: rfind-0.2.0.tar.gz
- Upload date:
- Size: 6.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.12.11
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
237e924d8a43856a6d36a865462b3ed7fef12a50d4c13d2dc0bd127d36b4ae6d
|
|
| MD5 |
ebbedf6a732be1516997a98da203c0ff
|
|
| BLAKE2b-256 |
eb85281e4a1bef4fdbaa73d1cdc333fa5f74d73a000eb6c086c8d4798fd9db5e
|
File details
Details for the file rfind-0.2.0-py3-none-any.whl.
File metadata
- Download URL: rfind-0.2.0-py3-none-any.whl
- Upload date:
- Size: 7.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.1.0 CPython/3.12.11
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
8d14368cf34299c82e0b4c066bf11275ba86db77a2a5661f60b95f42fc3936c0
|
|
| MD5 |
4b2d58f7dd8e56d1b936312968e09d94
|
|
| BLAKE2b-256 |
9826e5f7b91f4b7235bf5442365eb8a0e2f0574523fd7420e0c2873472fc8a25
|