information_disclosure_searchtools

A Python tool developed by Hafid Fajar, co-founder of Garuda Cyberthreat. It's specifically designed for full-power information disclosure vulnerability scanning, quickly and efficiently uncovering exposed sensitive data.

https://github.com/garudacyberthreat/information_disclosure_searchtools

Science Score: 44.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
    Found CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
    Found .zenodo.json file
  • DOI references
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (14.8%) to scientific vocabulary
Last synced: 6 months ago · JSON representation ·

Repository

A Python tool developed by Hafid Fajar, co-founder of Garuda Cyberthreat. It's specifically designed for full-power information disclosure vulnerability scanning, quickly and efficiently uncovering exposed sensitive data.

Basic Info
  • Host: GitHub
  • Owner: GarudaCyberThreat
  • License: mit
  • Default Branch: main
  • Size: 93.8 KB
Statistics
  • Stars: 7
  • Watchers: 1
  • Forks: 0
  • Open Issues: 0
  • Releases: 0
Created 8 months ago · Last pushed 7 months ago
Metadata Files
Readme Changelog Contributing License Code of conduct Citation Support

README.md

InfoDisclosureSearch Screenshot InfoDisclosureSearch - Powerful Information Disclosure Scanner Overview InfoDisclosureSearch is a robust and highly efficient Python-based tool designed for full-power information disclosure vulnerability scanning. Developed by Hafid Fajar, one of the co-founders of Garuda CyberThreat community, this tool meticulously hunts for sensitive data exposure in web applications, quickly and efficiently uncovering exposed sensitive information.

It automates the process of identifying common misconfigurations, leaked credentials, debug information, and other sensitive files that can compromise an application's security.

Features Comprehensive Scanning: Scans for a wide range of common information disclosure patterns, including .env files, .git artifacts, backup files, configuration files, and more.

Sensitive Data Pattern Matching: Utilizes a rich set of regular expressions to identify API keys, credentials, internal IP addresses, stack traces, and other sensitive strings within HTTP responses and JavaScript files.

Directory Listing Detection: Automatically identifies enabled directory listings that can expose file structures.

Subdomain Enumeration: Includes a passive subdomain brute-forcing feature to discover potentially vulnerable subdomains.

Header Analysis: Inspects HTTP headers for sensitive information.

Output to File: Saves all findings to a timestamped text file for easy review and reporting.

Cross-Platform Compatibility: Designed to run seamlessly on Windows (CMD), Linux (Kali Linux), and Android (Termux).

Who Developed This Tool? InfoDisclosureSearch was proudly developed by Hafid Fajar, a dedicated cybersecurity enthusiast and one of the esteemed co-founders of the Garuda CyberThreat community. This tool embodies the community's commitment to advancing cybersecurity knowledge and contributing valuable resources to the security landscape.

Installation & Requirements Before running InfoDisclosureSearch.pyc, you need to ensure you have Python and the necessary libraries installed.

Prerequisites: Python 3.x: This tool is built with Python 3. Make sure you have Python 3 installed on your system. You can download it from python.org.

Required Python Libraries:

requests: For making HTTP requests.

colorama: For colorful console output.

urllib3: (Typically comes with requests, but needed for warning suppression).

How to Install Required Libraries: Open your terminal/CMD/Termux and run the following command:

Bash

pip install requests colorama Running the Tool (InfoDisclosureSearch.pyc) The tool is provided as a compiled Python bytecode file (.pyc). This means you don't need the original .py source code to run it.

Important Note: .pyc files are specific to the Python version they were compiled with. Ensure your installed Python version is compatible (e.g., if it was compiled with Python 3.9, run it with Python 3.9).

  1. Download the Tool: First, download the InfoDisclosureSearch.pyc file (and place it in a dedicated folder, e.g., InfoDisclosureSearch/).

  2. Running on Windows (CMD): Open Command Prompt (CMD).

Navigate to the directory where you saved InfoDisclosureSearch.pyc. For example:

DOS

cd C:\Path\To\Your\InfoDisclosureSearch Run the tool using the Python interpreter:

DOS

python InfoDisclosureSearch.pyc 3. Running on Kali Linux / Other Linux Distributions: Open your Terminal.

Navigate to the directory where you saved InfoDisclosureSearch.pyc. For example:

Bash

cd /path/to/your/InfoDisclosureSearch Run the tool using the Python interpreter:

Bash

python3 InfoDisclosureSearch.pyc (Use python3 to explicitly call Python 3 if your system defaults to Python 2 for python).

  1. Running on Android (Termux): Install Termux from F-Droid or Google Play Store.

Update Termux packages:

Bash

pkg update && pkg upgrade Install Python:

Bash

pkg install python Install the required Python libraries:

Bash

pip install requests colorama Navigate to the directory where you saved InfoDisclosureSearch.pyc (you might need to grant Termux storage permissions and use commands like termux-setup-storage and cd /sdcard/Download/YourFolder). For example:

Bash

cd /data/data/com.termux/files/home/InfoDisclosureSearch # Or wherever you put it Run the tool:

Bash

python InfoDisclosureSearch.pyc Usage Once executed, the tool will prompt you to enter the target URL(s) or specify a file containing a list of URLs.

Bash

python InfoDisclosureSearch.pyc Follow the on-screen instructions to provide your target(s). The results will be displayed in the console and automatically saved to a text file (e.g., informationdisclosurescanresultsYYYYMMDD_HHMMSS.txt) in the same directory.

Disclaimer This tool is intended for ethical hacking, penetration testing, and educational purposes only. The Garuda CyberThreat community and Hafid Fajar are not responsible for any misuse or damage caused by this tool. Always ensure you have explicit permission from the target's owner before conducting any security scans.

Contributing We welcome contributions! If you have suggestions for improvements, new features, or bug fixes, feel free to open an issue or submit a pull request.

Connect with Garuda CyberThreat Stay updated and connect with our community through the following channels:

Email: garudacyberthreat@gmail.com

TikTok: @garudacyberthreat

Instagram: garuda_cyberthreat

Twitter/X: @GarudaCyberThre

License [You might want to add a license here, e.g., MIT License. Refer to the previous response on how to create a LICENSE file.]

Support Our Work If you find this tool useful and wish to support our efforts in developing more open-source cybersecurity tools and resources, you can donate via USDT (TRC20 Network).

USDT (TRC20) Wallet Address: TEtzPQgrmCYi6nEPaj6F7hxxmG1mKzNB3y

Your support is greatly appreciated!

Owner

  • Name: Garuda CyberThreat
  • Login: GarudaCyberThreat
  • Kind: user
  • Location: indonesia

Garuda Cyberthreat: Independent Indonesian cybersecurity community & bug hunters since July 7, 2025. Building a safer digital world, one vulnerability at a time

Citation (CITATION.md)

# How to Cite Information Disclosure Search Tools

If you use Information Disclosure Search Tools in your research, publications, or projects, we would greatly appreciate it if you cite it properly.

## Example Citation (General Format)

Here's an example of how you can cite this project:

Hafid Fajar (Garuda CyberThreat). (2025). Information Disclosure Search Tools (v0.1). GitHub. Available at: https://github.com/GarudaCyberThreat/Information_Disclosure_SearchTools


## Example Citation (IEEE Style)

[1] H. Fajar (Garuda CyberThreat), "Information Disclosure Search Tools," GitHub. [Online]. Available: https://github.com/GarudaCyberThreat/Information_Disclosure_SearchTools


## Example Citation (APA Style)

Fajar, H. (Garuda CyberThreat). (2025). Information Disclosure Search Tools (v0.1) [Software]. Retrieved from https://github.com/GarudaCyberThreat/Information_Disclosure_SearchTools


Thank you for citing our work!

GitHub Events

Total
  • Watch event: 5
  • Push event: 15
  • Create event: 2
Last Year
  • Watch event: 5
  • Push event: 15
  • Create event: 2

Dependencies

requirements.txt pypi
  • colorama >=0.4.6
  • requests >=2.28.1