Skip to content

Giardi77/InfoGrep

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

75 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Logo

🏎️💨 Grep for sensitive info FAST! 🏎️💨

FeaturesInstallationUsageContribute to this project

Features

  • Grep files or directories for sensitive information using predefined patterns.
  • Add custom patterns in YAML format.
  • Parallel processing
  • Get uniq results across multiple files

Installation

cargo install --git https://github.com/Giardi77/InfoGrep

Usage

The default pattern is 'secrets' wich points to default-patterns/rules-stable.yml, it contains a lot of regex for sensitive info such as Api Keys (aws, github and a lot more), Asymmetric Private Keys etc ... Another pre-installed patterns yaml is the 'pii', containing a lot of regex for emails, phone numbers and more.

Examples

Scan a file:

infogrep -i file1.txt

Scan a directory:

infogrep -i my_dir

Add a custom pattern in ~/.config/infogrep.patterns.json with "name" : "/path/to/yaml.yml"

Scan with a custom pattern:

infogrep -f file.js -p mypattern

Some regex might suck and match a lot of shit, you can use -t flag to truncate the output and see more results at once (default is 400 chars, if you want to see the whole thing set -t 0):

infogrep -i my_dir -t 1000

Be ULTRA Fast:

infogrep -i directory -w 8 #(8 workers in parallel)

Contribute

if you find this tool helpfull and want to give a better/new regex or anything that can improve performace pull request will be welcomed!

About

Grep for sensitive info

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages