keyhound

command module
v0.0.0-...-23e07d4 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Oct 9, 2024 License: MIT Imports: 13 Imported by: 0

README ยถ

๐Ÿ• KeyHound

KeyHound is an advanced JavaScript secrets hunting tool that sniffs out sensitive information from JavaScript files across web applications. Like a trained hunting dog, it tracks down secrets through web archives and crawling results, specializing in detecting API keys, credentials, and other sensitive data.

Go Version License Last Commit

๐ŸŒŸ Features

  • ๐Ÿพ Persistent tracking through waybackurls and katana
  • ๐Ÿ‘ƒ Advanced pattern sniffing for sensitive data
  • ๐Ÿฆฎ Automatic path finding and tool installation
  • ๐ŸŽฏ High-precision concurrent scanning
  • ๐Ÿฆด Discovered secrets including:
    • API Keys & Tokens
    • AWS Keys
    • Private Keys
    • Database Connection Strings
    • Internal Endpoints
    • JWT Tokens
    • Credentials
    • And more...

๐Ÿ› ๏ธ Installation

  1. Ensure Go 1.20 or later is installed:
go version
  1. Fetch KeyHound:
git clone https://github.com/elit3pwner/KeyHound.git
cd KeyHound
  1. Install dependencies:
go mod init keyhound
go mod tidy
  1. Train your hound:
go build -o keyhound

๐Ÿ“‹ Prerequisites

KeyHound will automatically fetch these tools, but you can manually install them:

  • waybackurls: go install github.com/tomnomnom/waybackurls@latest
  • katana: go install github.com/projectdiscovery/katana/cmd/katana@latest

๐Ÿƒ Running the Hunt

  1. Release the hound:
./keyhound
  1. Choose your hunting mode:

    • Use pre-collected trails (existing waybackurls and katana files)
    • Start a fresh hunt on a new domain
  2. For a fresh hunt:

    • Specify the target domain
    • Set the number of concurrent hunting threads
  3. KeyHound will:

    • Track URLs using waybackurls and katana
    • Sniff out JavaScript files
    • Hunt for sensitive information
    • Store its findings in the output directory

๐Ÿ“‚ The Hunt Results

KeyHound organizes its findings in the output directory:

  • waybackurls_domain.txt: The tracked URL paths
  • katana_domain.txt: Additional discovered trails
  • jsfiles_domain.txt: Located JavaScript files
  • sensitive_findings.txt: The valuable discoveries

๐Ÿ“ธ KeyHound in Action

image

๐ŸŽฏ Sample Discoveries

URL: https://example.com/assets/main.js
Pattern: api[_-]?key
Match: api_key: "abcd1234xyz"
---
URL: https://example.com/js/config.js
Pattern: mongodb(\+srv)?:\/\/[^\s<>"']+
Match: mongodb://admin:password@localhost:27017/db

โš ๏ธ Disclaimer

KeyHound is designed for security research and educational purposes only. Always obtain proper authorization before unleashing KeyHound on any domains. The authors are not responsible for any misuse or damage caused by this tool.

๐Ÿค Contributing

Got ideas to make KeyHound a better hunter? Contributions are welcome! Feel free to submit a Pull Request.

๐Ÿ“ License

KeyHound is licensed under the MIT License - see the LICENSE file for details.

๐Ÿ™ Acknowledgments


Created with โค๏ธ by elit3pwner

Documentation ยถ

The Go Gopher

There is no documentation for this package.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL