infogrep

Crates.ioinfogrep
lib.rsinfogrep
version3.0.3
sourcesrc
created_at2024-09-23 13:38:24.504386
updated_at2024-09-23 16:46:33.253193
descriptionA tool to grep for sensitive information
homepage
repositoryhttps://github.com/Giardi77/InfoGrep
max_upload_size
id1384093
size326,750
Daniele (Giardi77)

documentation

README

Logo

🏎️💨 Grep for sensitive info FAST! 🏎️💨

FeaturesInstallationUsageContribute to this project

Features

  • Grep files or directories for sensitive information using predefined patterns.

  • Add custom patterns in YAML format.

Installation

cargo install infogrep

Usage

The default pattern is 'secrets' wich points to default-patterns/rules-stable.yml, it contains a lot of regex for sensitive info such as Api Keys (aws, github and a lot more), Asymmetric Private Keys etc ... Another pre-installed patterns yaml is the 'pii', containing a lot of regex for emails, phone numbers and more.

Examples

Scan a file:

infogrep -i file1.txt

Scan a directory:

infogrep -i my_dir

Add a custom pattern in ~/.config/infogrep.patterns.json with "name" : "/path/to/yaml.yml"

Scan with a custom pattern:

infogrep -f file.js -p mypattern

Some regex might suck and match a lot of shit, you can use -t flag to truncate the output and see more results at once (default is 400 chars, if you want to see the whole thing set -t 0):

infogrep -i my_dir -t 1000

Contribute

if you find this tool helpfull and want to give a better/new regex or anything that can improve performace pull request will be welcomed!

Commit count: 75

cargo fmt