Skip to content

wuxiangdc/Github-Hunter

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Github-Hunter

This tool is for sensitive information searching on Github.

Requirements

Python 3.x

OS Support

Linux,MacOS,Windows

Installation

1.git clone https://github.com/Hell0W0rld0/Github-Hunter.git
Notice:Github Hunter only supports Python3.x, if you are using Python2.x,do some tests before use it
2.cd Github-Hunter
3.pip install virtualenv
4.virtualenv --python=/usr/local/bin/python3 env
5.source venv/bin/activate
6.pip install -r requirements

Settings

Befor use it,you must change parameters in info.ini.example,then change filename(just delete .example)

Example

[KEYWORD]
keyword = your main keyword here

[EMAIL]
host = Email server
user = Email User
password = Email password

[SENDER]
sender = The email sender

[RECEIVER]
receiver1 = Email receiver No.1
receiver2 = Email receiver No.2

[Github]
user = Github Username
password = Github Password

[PAYLOADS]
p1 = Payload 1
p2 = Payload 2
p3 = Payload 3
p4 = Payload 4
p5 = Payload 5
p6 = Payload 6

Keyword and Payloads

The keyword is main keyword,such as your company name,email,etc.
The payloads searching is based on main keyword's results.You can customize your payloads,the more you add, the more sensitive information will be found.

Run

python GithubHunter.py
You will receive a .csv file and emails when application complete.
CSV file includes repositories' url、user、upload data、filename which are best match of main keyword.
The emails will be send contain urls which certainly include sensitive information.

About

This tool is for sensitive information searching on Github.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%