All Projects β†’ x1sec β†’ Commit Stream

x1sec / Commit Stream

Licence: mit
#OSINT tool for finding Github repositories by extracting commit logs in real time from the Github event API

Programming Languages

go
31211 projects - #10 most used programming language
golang
3204 projects

Projects that are alternatives of or similar to Commit Stream

Osint Tools
πŸ‘€ Some of my favorite OSINT tools.
Stars: ✭ 155 (-24.02%)
Mutual labels:  osint
Iposint
⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project
Stars: ✭ 178 (-12.75%)
Mutual labels:  osint
Mosint
An automated e-mail OSINT tool
Stars: ✭ 184 (-9.8%)
Mutual labels:  osint
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-17.16%)
Mutual labels:  osint
Burpsuite Asset discover
Burp Suite extension to discover assets from HTTP response.
Stars: ✭ 177 (-13.24%)
Mutual labels:  osint
Misp Training
MISP trainings, threat intel and information sharing training materials with source code
Stars: ✭ 185 (-9.31%)
Mutual labels:  osint
Karma
Find leaked emails with your passwords
Stars: ✭ 154 (-24.51%)
Mutual labels:  osint
Discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+1149.02%)
Mutual labels:  osint
Intrec Pack
Intelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (-13.24%)
Mutual labels:  osint
Gitem
A Github organization reconnaissance tool.
Stars: ✭ 190 (-6.86%)
Mutual labels:  osint
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+1033.33%)
Mutual labels:  osint
Ivre
Network recon framework, published by @cea-sec & @ANSSI-FR. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,331 (+1042.65%)
Mutual labels:  osint
Netz
Discover internet-wide misconfigurations while drinking coffee
Stars: ✭ 159 (-22.06%)
Mutual labels:  osint
Venmo Data
Venmo trasaction dataset for data analysis/visualization/anything
Stars: ✭ 164 (-19.61%)
Mutual labels:  osint
Pockint
A portable OSINT Swiss Army Knife for DFIR/OSINT professionals πŸ•΅οΈ πŸ•΅οΈ πŸ•΅οΈ
Stars: ✭ 196 (-3.92%)
Mutual labels:  osint
Scylla
The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (-24.51%)
Mutual labels:  osint
Twitter Intelligence
Twitter Intelligence OSINT project performs tracking and analysis of the Twitter
Stars: ✭ 179 (-12.25%)
Mutual labels:  osint
Pwnback
Burp Extender plugin that generates a sitemap of a website using Wayback Machine
Stars: ✭ 203 (-0.49%)
Mutual labels:  osint
Misp Modules
Modules for expansion services, import and export in MISP
Stars: ✭ 198 (-2.94%)
Mutual labels:  osint
Cardpwn
OSINT Tool to find Breached Credit Cards Information
Stars: ✭ 187 (-8.33%)
Mutual labels:  osint

Commit Stream

commit-stream drinks commit logs from the Github event firehose exposing the author details (name and email address) associated with Github repositories in real time.

OSINT / Recon uses for Redteamers / Bug bounty hunters:

  • Uncover repositories which employees of a target company is commiting code (filter by email domain)
  • Identify repositories belonging to an individual (filter by author name)
  • Chain with other tools such as trufflehog to extract secrets in uncovered repositories.

asciicast

Installation

Binaries

Compiled 64-bit executable files for Windows, Mac and Linux are available here

Go get

If you would prefer to build yourself (and Go is setup correctly):

go get -u github.com/x1sec/commit-stream

Building from source

go get && go build

Usage

Usage:
  commit-stream [OPTIONS]

Options:
  -e, --email        Match email addresses field (specify multiple with comma). Omit to match all.
  -n, --name         Match author name field (specify multiple with comma). Omit to match all.
  -t, --token        Github token (if not specified, will use environment variable 'CSTREAM_TOKEN')
  -a  --all-commits  Search through previous commit history (default: false)
  -i  --ignore-priv  Ignore noreply.github.com private email addresses (default: false)  

commit-stream requires a Github personal access token to be used. You can generate a token navigating in Github [Settings / Developer Settings / Personal Access Tokens] then selecting 'Generate new token'. Nothing here needs to be selected, just enter the name of the token and click generate.

Once the token has been created, the recommended method is to set it via an environment variable CSTREAM_TOKEN:

export CSTREAM_TOKEN=xxxxxxxxxx

Alternatively, the --token switch maybe used when invoking the program, e.g:

./commit-stream --token xxxxxxxxxx

When running commit-stream with no options, it will immediately dump author details and the associated repositories in CSV format to the terminal. Filtering options are available.

To filter by email domain:

./commit-stream --email '@company.com'

To filter by author name:

./commit-stream --name 'John Smith'

Multiple keywords can be specified with a , character. e.g.

./commit-stream --email '@telsa.com,@ford.com'

It is possible to search upto 20 previous commits for the filter keywords by specifying --all-commits. This may increase the likelihood of a positive matches.

Email addresses that have been set to private (@users.noreply.github.com) can be ommited by specifying --ignore-priv. This is useful to reduce the volume of data collected if running the tool for an extended period of time.

Credits

Some inspiration was taken from @Darkport's ssshgit excellent tool to extract secrets from Github in real-time. commit-stream's objective is slightly different as it focuses on extracting the 'meta-data' as opposed to the content of the repositories.

Note

Github provides the ability to prevent email addresses from being exposed. In the Github settings select Keep my email addresses private and Block command line pushes that expose my email under the Email options.

As only one token is used this software does not breach any terms of use with Github. That said, use at your own risk. The author does not hold any responsibility for it's usage.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].