Data leak scanners

Introduction

Usage

Data leak scanners are typically used for data leak detection and data leak prevention.

Users for these tools include pentesters, security professionals.

Tools

AIL framework (framework to parse data of information leaks)

data extraction, data leak detection, information leak detection, security monitoring

AIL is a modular framework which helps to analyze potential information leaks. The framework is flexible and supports different kinds of data formats and sources. For example, one of the sources is the collection of pastes from Pastebin. A tool like AIL is commonly used to detect or even prevent data leaks.

S3Scanner (AWS S3 bucket scanner)

information gathering, information leak detection, penetration testing, storage security testing

The aptly named S3Scanner is to be used to detect AWS S3 buckets. Discovered buckets are displayed, together with the related objects in the bucket.

SMBMap (SMB enumeration tool)

data leak detection, information gathering, penetration testing

SMBMap allows scanning of file resources that are shared with the SMB protocol. The tool will list share drives, drive permissions, the share contents, upload/download functionality, file name auto-download pattern matching, and even execute remote commands. The tool was created for pentesters to simplify finding sensitive data, or at least test for it.

snallygaster (discover sensitive files on web servers)

data leak detection, discovery of sensitive information, information leak detection

This tool helps with detecting those files that you typically do not want to have exposed on your webservers. This includes files related to software repositories (e.g. .git), web shells,

Teh S3 Bucketeers (AWS S3 bucket scanner)

penetration testing, security assessment, storage security testing

Tools like Teh S3 Bucketeers are valuable for doing reconnaissance and information gathering. They may be used during penetration tests and security assessments. The primary goal of these tools is to find S3 buckets that may lead to sensitive data stored on Amazon's storage service.

Missing a favorite tool in this list? Share a tool suggestion and we will review it.