Skip to main content

Discover files in directories with execute-only permission - C-accelerated with Python fallback

Project description

rfind - Restricted File Finder

.

Overview

rfind is a security and system administration tool designed for situations where you have execute (x) permission on a directory but lack read (r) permission. In such cases, traditional directory listing commands like ls fail with "Permission denied", yet you can still access files if you know their names.

This tool helps you discover what files exist in such restricted directories through intelligent enumeration techniques.

The Problem

On Unix-like systems (including Linux and Android), directory permissions work like this:

  • Read (r) permission: List directory contents
  • Execute (x) permission: Access files within the directory (if you know their names)
  • Both are needed: To both list AND access files

When you have x but not r, you're in a "blind" situation - you can't see what's there, but you can touch what you find.

How rfind Helps

rfind provides several approaches to discover files:

  1. Smart pattern matching - Common file naming conventions
  2. Brute-force enumeration - Systematic checking of possible names
  3. Multi-process scanning - Leverage all CPU cores for speed
  4. Custom character sets - Tailor searches to specific environments

Use Cases

  • Security auditing - Discovering hidden or protected files
  • Digital forensics - Investigating system directories
  • System administration - Recovering from permission issues
  • Penetration testing - Exploring restricted environments
  • Android device analysis - Accessing protected system directories

Installation

pip install rfind

Basic Usage

# Scan a directory with limited permissions
rfind /system/bin

# Use smart mode for common patterns
rfind --smart /dev

Technical Details

The tool employs parallel processing to efficiently enumerate possible filenames based on:

· Length constraints (1-6 characters typically) · Character sets (alphanumeric, specific symbols, etc.) · Common naming patterns in Unix/Linux/Android systems

Ethical Use

This tool should only be used on:

· Systems you own or have explicit permission to test · For legitimate security auditing and system administration · Educational and research purposes

Development Status

Early alpha release. Core functionality is implemented with ongoing development for additional features and optimizations.

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

License

MIT License - see LICENSE file for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

rfind-0.2.0.tar.gz (6.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

rfind-0.2.0-py3-none-any.whl (7.1 kB view details)

Uploaded Python 3

File details

Details for the file rfind-0.2.0.tar.gz.

File metadata

  • Download URL: rfind-0.2.0.tar.gz
  • Upload date:
  • Size: 6.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.11

File hashes

Hashes for rfind-0.2.0.tar.gz
Algorithm Hash digest
SHA256 237e924d8a43856a6d36a865462b3ed7fef12a50d4c13d2dc0bd127d36b4ae6d
MD5 ebbedf6a732be1516997a98da203c0ff
BLAKE2b-256 eb85281e4a1bef4fdbaa73d1cdc333fa5f74d73a000eb6c086c8d4798fd9db5e

See more details on using hashes here.

File details

Details for the file rfind-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: rfind-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 7.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.12.11

File hashes

Hashes for rfind-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 8d14368cf34299c82e0b4c066bf11275ba86db77a2a5661f60b95f42fc3936c0
MD5 4b2d58f7dd8e56d1b936312968e09d94
BLAKE2b-256 9826e5f7b91f4b7235bf5442365eb8a0e2f0574523fd7420e0c2873472fc8a25

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page