Dylan(@InsecureNature) 's Twitter Profile Photo

The Sisense breach was rooted in an AWS key in Git.

That got me wondering if was a musical, what would it sound like...

account_circle
Securing Bits(@securing_bits) 's Twitter Profile Photo

Implement secret scanning in your pipelines with the following 5 open-source tools:

- Trufflehog github.com/trufflesecurit…

- GitLeaks github.com/gitleaks/gitle…

- Semgrep github.com/semgrep/semgrep

- Talisman github.com/thoughtworks/t…

- Yelp Detect-Secrets github.com/Yelp/detect-se…

Implement secret scanning in your pipelines  with the following 5 open-source tools:

- Trufflehog github.com/trufflesecurit…

- GitLeaks github.com/gitleaks/gitle…

- Semgrep github.com/semgrep/semgrep

- Talisman github.com/thoughtworks/t…

- Yelp Detect-Secrets github.com/Yelp/detect-se…
account_circle
sushi com abacate(@sushicomabacate) 's Twitter Profile Photo

Aproveitei a pra escrever um script que lê todos os forks da rinha-de-backend-2024-q1 e executa o Trufflehog pra ver se alguém hardcodou alguma credencial legal

Aproveitei a #rinhadebackend pra escrever um script que lê todos os forks da rinha-de-backend-2024-q1 e executa o Trufflehog pra ver se alguém hardcodou alguma credencial legal #bolhasec
account_circle
Rayane(@rasaboun) 's Twitter Profile Photo

10th of December: Truffle Security

🤔I was researching how to better secure code in my GitHub repos when I met TruffleHog, who checks for hidden secrets !💡

Let me tell you why this secrets-sniffer is so great for keeping my code safe ⤵️

10th of December: @trufflesec 

🤔I was researching how to better secure code in my GitHub repos when I met TruffleHog, who checks for hidden secrets !💡

Let me tell you why this secrets-sniffer is so great for keeping my code safe ⤵️
account_circle
4nt1p4tt3rn 🏴‍☠ Appalachistan Wolf Lodge #47(@4nt1p4tt3rn) 's Twitter Profile Photo

Since I mentioned it, and others are interested:
github.com/iBotPeaches/Ap…

github.com/trufflesecurit…

Install both, and any dependencies.

Find an Android app you're interested in.

Download it from apkcombo.com.

Decompile it with 'apktool d <filename>'

account_circle
Truffle Security(@trufflesec) 's Twitter Profile Photo

🤔 Why don’t bug bounty programs reward researchers for finding stolen credentials?
🔍We interviewed ’s CISO about new guidelines including:
🔑 Credential types & vulnerabilities
⚖️ Legal risks
🛠️ TruffleHog tools
trufflesecurity.com/blog/bug-bount…

account_circle
Zack Allen(@techyteachme) 's Twitter Profile Photo

Going through Steve YARA Synapse Miller 's YARA training and playing with atom matching for speed to find aws keys in files

Good and bad guys leave secrets in files. Use regex! Go to Trufflehog, copy regex, load in cyberchef and voila

gist: gist.github.com/zmallen/d2305b…

Going through @stvemillertime 's YARA training and playing with atom matching for speed to find aws keys in files #100daysofyara

Good and bad guys leave secrets in files. Use regex! Go to Trufflehog, copy regex, load in cyberchef and voila

gist: gist.github.com/zmallen/d2305b…
account_circle
Jared Folkins(@JF0LKINS) 's Twitter Profile Photo

Today's notes include AST analysis for web apps, RustHound for Active Directory, youneverknow00's kernelmode DLL injector, pwndoc-ng for pentest reporting, GraphRunner for Entra IDS, TruffleHog, U-Boot and UART for Android extraction, and remote browser isolation bypass…

Today's notes include AST analysis for web apps, RustHound for Active Directory, youneverknow00's kernelmode DLL injector, pwndoc-ng for pentest reporting, GraphRunner for Entra IDS, TruffleHog, U-Boot and UART for Android extraction, and remote browser isolation bypass…
account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

'So how do you know if you have buried secrets hiding in the vast digital landscape of your organization? Easy. You employ a truffle hog.'

Rooting For Secrets with TruffleHog
by: Chris Traynor
Published: 1/18/2024
Learn more: blackhillsinfosec.com/rooting-for-se…

'So how do you know if you have buried secrets hiding in the vast digital landscape of your organization? Easy. You employ a truffle hog.'

Rooting For Secrets with TruffleHog 
by: @cstraynor
Published: 1/18/2024
Learn more: blackhillsinfosec.com/rooting-for-se…
account_circle
Truffle Security(@trufflesec) 's Twitter Profile Photo

Heading to BSidesSF this weekend?

🚀 Visit our booth for the latest updates!

📅 Talks to catch:
🌟 Sat, May 4, 12 PM - 'The Secret Life of Secrets'
🌟 Sun, May 5, 11:15 AM - 'Beyond Code and Clicks'
Check out the schedule: bsidessf.org/schedule

Heading to @BSidesSF this weekend?

🚀 Visit our booth  for the latest #TruffleHog updates!

📅 Talks to catch:
🌟 Sat, May 4, 12 PM - 'The Secret Life of Secrets'
🌟 Sun, May 5, 11:15 AM - 'Beyond Code and Clicks'
Check out the schedule: bsidessf.org/schedule
account_circle
Dylan(@InsecureNature) 's Twitter Profile Photo

There seems to be a little confusion around our post Friday about TruffleHog now decoding AWS account ID's from Access ID's.

It's a new feature of TruffleHog; it's not a security exploit. It's just meant to make people's lives a little easier after discovering secret key pairs.

There seems to be a little confusion around our post Friday about TruffleHog now decoding AWS account ID's from Access ID's. 

It's a new feature of TruffleHog; it's not a security exploit. It's just meant to make people's lives a little easier after discovering secret key pairs.
account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

**NEW** BHIS | Blog
Are your secrets safe?

Rooting For Secrets with TruffleHog
by: Chris Traynor
Published: 1/18/2024

Learn more: blackhillsinfosec.com/rooting-for-se…

**NEW** BHIS | Blog
Are your secrets safe?

Rooting For Secrets with TruffleHog 
by: @cstraynor
Published: 1/18/2024

Learn more: blackhillsinfosec.com/rooting-for-se…
account_circle
Shah Sheikh(@shah_sheikh) 's Twitter Profile Photo

TruffleHog: Open-source solution for scanning secrets: TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a research tool I independently authored in… helpnetsecurity.com/2024/02/21/tru…

TruffleHog: Open-source solution for scanning secrets: TruffleHog is an open-source scanner that identifies and addresses exposed secrets throughout your entire technology stack. “TruffleHog was originally a research tool I independently authored in… helpnetsecurity.com/2024/02/21/tru…
account_circle
Black Hills Information Security(@BHinfoSecurity) 's Twitter Profile Photo

'Identifying and cleaning up leaked secrets before an attacker can find them is a crucial component to security.'

Rooting For Secrets with TruffleHog
by: Chris Traynor
Published: 1/18/2024
Learn more: blackhillsinfosec.com/rooting-for-se…

'Identifying and cleaning up leaked secrets before an attacker can find them is a crucial component to security.'

Rooting For Secrets with TruffleHog 
by: @cstraynor
Published: 1/18/2024
Learn more: blackhillsinfosec.com/rooting-for-se…
account_circle
Anton(@therceman) 's Twitter Profile Photo

Bug Bounty Hint

You can use the Trufflehog Chrome extension for the automated gathering of AWS Keys and Generic/Specific secrets on the visited website.

Later, you can check AWS key validity & permissions using the following GitHub repository:
🔗 github.com/andresriancho/…

Cheers

Bug Bounty Hint

You can use the Trufflehog Chrome extension for the automated gathering of AWS Keys and Generic/Specific secrets on the visited website.

Later, you can check AWS key validity & permissions using the following GitHub repository:
🔗 github.com/andresriancho/…

Cheers
account_circle