• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Force Push Scanner – Hunt GitHub Dangling Commits for Leaked Secrets

July 11, 2025

Views: 583

Force Push Scanner is an offensive security tool that identifies secrets inadvertently left in deleted commits following GitHub force‑push events. Developed by Truffle Security, it leverages GitHub Archive logs to surface ephemeral exposures in developer workflows.

Force Push Scanner - Hunt GitHub Dangling Commits for Leaked Secrets

Overview

GitHub force push allows users to overwrite branch history, often to remove sensitive information such as API keys, credentials, or tokens. While the intention is to erase sensitive data, artefacts remain accessible in dangling commits—unreferenced snapshots retained temporarily on GitHub’s infrastructure. Force Push Scanner monitors these events in real-time, extracts Git commit diffs, scans for secrets, and reports exposures before they are permanently deleted.

The tool integrates with GitHub Archive, a project that archives all public GitHub events. It parses push events and specifically scans for force type pushes, then retrieves commit contents to apply regex and entropy-based secret detection.

Features

  • Real‑time monitoring of GitHub force‑push events
  • Regex patterns and entropy heuristics to find credentials
  • Docker container for easy deployment or direct Python execution
  • Configurable alerting via Slack or email
  • Log events for further audit or red team reporting

Use Cases

Red teams can deploy Force Push Scanner to stealthily monitor target repositories during penetration tests or red team engagements. It identifies leaked credentials before defenders uncover them. Security teams can also test developer hygiene by simulating monitoring to flag misconfigurations.

Since it tracks all public force pushes, the tool can be used for open-source intelligence, identifying high-profile targets that leak secrets, which is useful for OSINT and threat researchers.

Red Team Relevance

Force Push Scanner enriches post-exploitation workflows by harvesting credentials from publicly discarded history. These secrets may lead to cloud access, token reuse, or lateral movement paths. It complements existing reconnaissance frameworks such as Caracal for clandestine persistence and Force Push Scanner for credential harvesting, expanding both red and blue team visibility.

Comparison with Other Tools

Unlike tools like GitLeaks or TruffleHog, which scan current repositories, Force Push Scanner targets ephemeral history that defenders rarely monitor. That history may contain freshly committed secrets that are later removed. This real-time scavenging fills a gap in traditional secret scanning workflows.

Detection, Avoidance, and Mitigation

  • Disable force-push on protected branches to prevent secret leaks via history rewriting
  • Implement pre‑push secret scanning via Git hooks
  • Maintain audit logs for force pushes and enforce peer reviews
  • Use dedicated secret management solutions to reduce the risk of accidental commit

Deployment

To deploy via Docker, use:

1
2
docker pull trufflesecurity/force-push-scanner
docker run -e GITHUB_TOKEN=your-token trufflesecurity/force-push-scanner

Alternatively install via Python:

1
2
pip install force-push-scanner
force-push-scanner --token your-token --slack-webhook <URL>

Final Analysis

Force Push Scanner is a focused offensive tool that turns a common developer habit into a reconnaissance opportunity. It highlights how ephemeral commit history contains high-value intelligence for red teams. By integrating real-time secret discovery into workflows, teams can both simulate adversarial activity and harden developer pipelines.

You can read more or download Force Push Scanner here: https://github.com/trufflesecurity/force-push-scanner

Related Posts:

  • Privacy Implications of Web 3.0 and Darknets
  • Leveraging OSINT from the Dark Web - A Practical How-To
  • Autoswagger - Automated discovery and testing of…
  • mcp-scanner - Python MCP Scanner for…
  • An Introduction To Web Application Security Systems
  • gitlab-runner-research - PoC for abusing self-hosted…
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Hacking Tools Tagged With: dangling secrets, github security, secret security



Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Reconnoitre - Open-Source Reconnaissance and Service Enumeration Tool

Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Views: 311

Reconnoitre is an open-source reconnaissance tool that automates multithreaded information gathering … ...More about Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool

Scanners-Box - Open-Source Reconnaissance and Scanning Toolkit

Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Views: 488

Scanners-Box is an open-source, community-curated collection of scanners and reconnaissance … ...More about Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit

Red Teaming LLMs 2025 - Offensive Security Meets Generative AI

Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

Views: 524

As enterprises deploy large language models (LLMs) at scale, the offensive security discipline of … ...More about Red Teaming LLMs 2025 – Offensive Security Meets Generative AI

gitlab-runner-research - PoC for abusing self-hosted GitLab runners

gitlab-runner-research – PoC for abusing self-hosted GitLab runners

Views: 339

gitlab-runner-research is a proof-of-concept repository and write-up that demonstrates how attackers … ...More about gitlab-runner-research – PoC for abusing self-hosted GitLab runners

mcp-scanner - Python MCP Scanner for Prompt-Injection and Insecure Agents

mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Views: 590

mcp-scanner is an open-source Python tool that scans Model Context Protocol (MCP) servers and agent … ...More about mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents

Deepfake-as-a-Service 2025 - How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Views: 673

Deepfake operations have matured into a commercial model that attackers package as … ...More about Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (231)
  • Cryptography (85)
  • Dark Web (4)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (12)
  • Hacker Culture (10)
  • Hacking News (236)
  • Hacking Tools (708)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,395,024)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,814)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,292)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,142)
  • Password List Download Best Word List – Most Common Passwords (934,346)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,068)
  • Hack Tools/Exploits (673,985)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,054)

Search

Recent Posts

  • Reconnoitre – Open-Source Reconnaissance and Service Enumeration Tool November 10, 2025
  • Scanners-Box – Open-Source Reconnaissance and Scanning Toolkit November 7, 2025
  • Red Teaming LLMs 2025 – Offensive Security Meets Generative AI November 5, 2025
  • gitlab-runner-research – PoC for abusing self-hosted GitLab runners November 3, 2025
  • mcp-scanner – Python MCP Scanner for Prompt-Injection and Insecure Agents October 31, 2025
  • Deepfake-as-a-Service 2025 – How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses October 29, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy