Detecting credentials leak with GitLeaks

GitLeaks is an open source tool used to detect and prevent secrets like passwords, api-keys, tokens be checked in to git repository. The main advantage of GitLeaks is that it not only scans your latest source code but also the entire git history identifying any secrets committed to your source code in the past as … Read more

How to track file system changes with Python3

File integrity in IT refers to the process of protecting a file from unauthorized changes, including cyber-attacks. In other words, a file’s ‘integrity’ is validated to determine whether or not it has been altered after its creation, curation, archiving or other qualifying event. This is why track file system changes is a very important step … Read more

Windows Forensics. AppData Cache analysis using sqlite3reader

Each server administrator copies some data in clipboard while doing configuration. This is why cache analysis or I context of the article clipboard forensics may bring unexcepted interesting information. It work another way, threat analytic should consider using clipboard analysis performing regular or, in bad scenario, post mortem investigation. Our sqlite3reader was developed to make … Read more