└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # Sensitive-Data-Exposures-with-Github 2 | Techniques / Tips and tricks for finding sensitive data exposures in Github for Penetration Testers / Bug Bounty Hunters 3 | 4 | 5 | 6 | https://www.youtube.com/watch?v=l0YsEk_59fQ 7 | 8 | Inspired by @Th3G3nt3lman 9 | 10 | ## Find Sensitive information leaks : ( Manual Approch ) 11 | 12 | Below basic examples : 13 | 14 | "Company" password 15 | 16 | "Company" secret 17 | 18 | "Company" credentials 19 | 20 | "Company" token 21 | 22 | "Company" config 23 | 24 | "Company" key 25 | 26 | "Company" pass 27 | 28 | "Company" login 29 | 30 | "Company" ftp 31 | 32 | "Company" pwd 33 | 34 | "Company" vspher 35 | 36 | "Company" aws 37 | 38 | "Company" jenkins 39 | 40 | 41 | 42 | 43 | 44 | With creaitivity there is a lot of stuff to look for : 45 | 46 | "Company" security_credentials ---> LDAP ( active directories ) 47 | 48 | "Company" connectionstring ---> Database Cred 49 | 50 | "Company" JDBC ---> Database Cred 51 | 52 | "Company" ssh2_auth_password ---> unautorized access to servers 53 | 54 | "Company" send_keys 55 | 56 | "Company" send,keys 57 | 58 | "Company" ldap 59 | 60 | 61 | List of keywords , much thanks : 62 | 63 | https://github.com/random-robbie/keywords/blob/master/keywords.txt 64 | 65 | https://securitytrails.com/blog/github-dorks 66 | 67 | 68 | ________________________ 69 | 70 | 71 | You can use language:python for example to search for specific programing language codes. Example : 72 | 73 | "Company" language:pyhton password 74 | 75 | 76 | ________________________ 77 | 78 | 79 | From [ Sort ] , you can use it to find for [ Recently Indexed ] ones which is important. 80 | 81 | ________________________ 82 | 83 | 84 | "Company" language:pyhton password NOT owner-api.teslamotors.com 85 | 86 | Will sort the results and remove everything realted to [ owner-api.teslamotors.com ] 87 | 88 | 89 | ________________________ 90 | 91 | 92 | user:VALUE ---> To look for code commited for a specific user 93 | 94 | org:Value ---> Specific org 95 | 96 | 97 | 98 | 99 | _______________________ 100 | https://github.com/jcesarstef/ghhdb-Github-Hacking-Database 101 | 102 | 103 | 104 | ## Find Sensitive information leaks : ( Automation Approch ) 105 | 106 | 107 | Using gitrob : https://github.com/michenriksen/gitrob 108 | 109 | Using TruffleHog : https://github.com/dxa4481/truffleHog 110 | 111 | Using gitGraber: https://github.com/hisxo/gitGraber 112 | 113 | Using git-all-secrets: https://github.com/anshumanbh/git-all-secrets 114 | 115 | Using Truffle hunting: https://github.com/dxa4481/truffleHog 116 | 117 | 118 | https://github.com/gwen001/github-search 119 | 120 | Don't forget bitbucket, gitlab and google dorking 2. 121 | https://lmgtfy.com/ 122 | 123 | _____________________________________ 124 | 125 | ## Google Dorks 126 | 127 | ``` 128 | intext:"© Example Inc." 129 | site:http://ideone.com "apikey" 130 | site:http://ideone.com "aws_access_key_id" 131 | intitle:" about atlassian bitbucket" 132 | ``` 133 | --------------------------------------------------------------------------------