{"id":4522,"date":"2017-05-16T21:36:33","date_gmt":"2017-05-16T13:36:33","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4522"},"modified":"2017-05-16T21:38:12","modified_gmt":"2017-05-16T13:38:12","slug":"github-dorks-github-security-scanning-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2017\/05\/github-dorks-github-security-scanning-tool\/","title":{"rendered":"Github Dorks – Github Security Scanning Tool"},"content":{"rendered":"

Github search is quite a powerful and useful feature and can be used to search for sensitive data in repositories, this Github security scanning tool comes with a collection of Github dorks that can reveal sensitive personal and\/or other proprietary organisational information such as private keys, credentials, authentication tokens and so on.<\/p>\n

\"Github<\/p>\n

github-dork.py<\/code> is a simple Python tool that can search through your repository or your organisation\/user repositories. It’s not a perfect tool at the moment but provides a basic functionality to automate the search on your repositories against the dorks specified in the text file.<\/p>\n

You can also check out: Gitrob \u2013 Scan Github For Sensitive Files<\/a><\/p>\n