Responding to Request for Collaborators #30
Replies: 2 comments 11 replies
-
Hey @JustinTimperio! I appreciate you reaching out boss. I'm totally open to contributions or even just chatting out ideas to make this tool useful and performant for many different scenarios. I think in the spirit of openness, if you ever have a new idea or concept for the repository, I'd love to try and keep stuff as public GitHub discussion posts as much as possible. Gives more people an opportunity to participate in the discussion and keeps the evolution of the project very transparent 😄 As far as your idea goes, I think that's a great concept. For context, as of right now Pillager is backed entirely by Gitleaks' Non-git scanner so it functions much in the same way by just jumping straight into the files and digging for matches. I think there's a potential for a really nice hybrid or even just joining between your idea and the way it currently functions. The pre-scan approach almost sounds like it could be executed as a separate command, e.g. |
Beta Was this translation helpful? Give feedback.
-
I think this can be very difficult, as Go has a very active community with some amazing projects. I think the core team tho does a good job of following the KISS principle.
It ends up around 1GB uncompressed in mem. I think a lot of this is just poor go garbage collection. In any case, the compression brings it down into the 100-400MB range depending on the file system.
It was a 1-hour hack job so it's not very clean
I think this is a fair assessment. I also assumed from the name that as a "pillager" the goal would be to raid a file system for pretty much anything of value. These days I am primarily a grey hat hacker and I rarely run into git repos in the wild. As an attacker, I am interested in far more generic and commonplace file types. For example, personal info such as pictures, accounting records, and other background info can be used to build extremely powerful social engineering attacks. These file types are much harder to sort through and require a far more detailed inventory and scanning methodology than say a gitleaks. |
Beta Was this translation helpful? Give feedback.
-
Hi @brittonhayes,
I saw that you are currently looking for collaborators on this project and I have some interest in working on this. I recently built a tool (sadly a little too small for a repo) that could rapidly scan an entire disk's file tree into a compressed JSON object for exfiltration by an attacker. Rather than apply scanning rules on the client end, the object was to retrieve a list of all files as fast as possible, then let the attacker use their CPU resources to analyze the file paths, then return for the interesting files at a later point.
I'm not sure this work is directly relevant but it may provide you with some performance optimizations. I used (godirwalk)[https://github.com/karrick/godirwalk] which you may find useful. In benchmarks, it destroys pretty much everything else :)
Feel free to DM at:
Beta Was this translation helpful? Give feedback.
All reactions