Skip to content

Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.

License

Notifications You must be signed in to change notification settings

peterjaric/archaeologit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Archaeologit

This script scans the history of a user's GitHub repositories for a given pattern to find sensitive things that may have been there but have been overwritten in a later commit. For example passwords or secret tokens.

Usage

archaeologit.sh <github username or git repo url> '<regular expression to search for>' [<log file>]

Examples

archaeologit.sh USERNAME 'password.....|secret.....|passwd.....|credentials.....|creds.....|aws.?key.....|consumer.?key.....|api.?key.....|aws.?token.....|oauth.?token.....|access.?token.....|api.?token.....'
archaeologit.sh peterjaric 'password|secret|token' scan.log

Example output

Example output when running archaeologit

About

Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages