DNSteal alternatives

Looking for an alternative tool to replace DNSteal? During the review of DNSteal we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. DET (data loss prevention testing)
  2. AIL framework (framework to parse data of information leaks)
  3. GitMiner (Git data miner)

These tools are ranked as the best alternatives to DNSteal.

Alternatives (by score)

64

DET

Introduction

This tool can be used to identify possible DLP failures. It uses different data exfiltration techniques, which could (or not) trigger a DLP solution.

Project details

DET is written in Python.

Strengths and weaknesses

  • + The source code of this software is available
  • - No releases on GitHub available

Typical usage

  • Learning
  • Penetration testing

DET review

60

AIL framework

Introduction

AIL is a modular framework which helps to analyze potential information leaks. The framework is flexible and supports different kinds of data formats and sources. For example, one of the sources is the collection of pastes from Pastebin. A tool like AIL is commonly used to detect or even prevent data leaks.

Project details

AIL framework is written in Python.

Strengths and weaknesses

  • + More than 10 contributors
  • + The source code of this software is available

    Typical usage

    • Data extraction
    • Data leak detection
    • Information leak detection
    • Security monitoring

    AIL framework review

    60

    GitMiner

    Introduction

    GitMiner is a tool to scan for sensitive data that is leaked via software repositories. Examples of sensitive data are authentication details such as passwords or connection settings.

    Project details

    GitMiner is written in Python.

    Strengths and weaknesses

    • + More than 1000 GitHub stars
    • + The source code of this software is available

      Typical usage

      • Asset discovery
      • Discovery of sensitive information
      • Information leak detection

      GitMiner review

      60

      git-secrets

      Introduction

      You would most likely use git-secrets in development teams or as an individual developer. The primary goal is to prevent accidentally submitting authentication details or otherwise sensitive information to your software repositories.

      Project details

      git-secrets is written in shell script.

      Strengths and weaknesses

      • + The source code of this software is available

        Typical usage

        • Data leak prevention
        • Information leak prevention

        git-secrets review

        63

        DNSChef

        Introduction

        DNSChef is a DNS proxy that can be used terminate or intercept traffic for DNS traffic. This might be useful during a penetration test or when researching malware and manipulate the actual DNS responses.

        Project details

        60

        Fierce

        Introduction

        Fierce is a security tool that helps with DNS reconnaissance. It can locate non-contiguous IP space, but using DNS information.

        Project details

        Fierce is written in Python.

        Strengths and weaknesses

        • + The source code of this software is available

          Typical usage

          • Information gathering
          • Reconnaissance
          • Security assessment

          Fierce review

          64

          QuickScan

          Introduction

          Although there are many port scanning utilities, sometimes it is specific functionality that makes a tool really powerful. For example, QuickScan saves the results of a scan, which then can be processed later for follow-up.

          Project details

          QuickScan is written in Python.

          Strengths and weaknesses

          • + Very low number of dependencies
          • + The source code of this software is available
          • - No releases on GitHub available
          • - Full name of author is unknown

          Typical usage

          • Network scanning

          QuickScan review

          60

          SubBrute (subdomain-bruteforcer)

          Introduction

          SubBrute is a DNS meta-query spider that enumerates DNS records and subdomains. This can be useful during penetration tests and security assessments.

          Project details

          SubBrute is written in Python.

          Strengths and weaknesses

          • + More than 1000 GitHub stars
          • + The source code of this software is available
          • - Full name of author is unknown

          Typical usage

          • Information gathering
          • Penetration testing
          • Security assessment

          SubBrute review

          60

          SubFinder

          Introduction

          SubFinder is a tool to scan domains and discover subdomains. This may be useful during the reconnaissance phase of penetration testing where information is collected. Some subdomains may reveal sensitive data or point to interesting targets such as a backup location.

          Project details

          SubFinder is written in Golang.

          Strengths and weaknesses

          • + Tool is modular and extendable
          • + More than 500 GitHub stars
          • + The source code of this software is available

            Typical usage

            • Discovery of sensitive information
            • Information gathering
            • Penetration testing
            • Reconnaissance
            • Security assessment

            SubFinder review

            60

            aiodnsbrute (Async DNS Brute)

            Introduction

            When a project requires resolving or guessing host names, then this tool is a great addition to the toolkit. It focuses on 'fast' by using asynchronous operations. The list of names to try is provided with a wordlist.

            Project details

            aiodnsbrute is written in Python.

            Strengths and weaknesses

            • + Very low number of dependencies
            • + The source code of this software is available

              Typical usage

              • Network scanning
              • Penetration testing

              aiodnsbrute review

              74

              OpenStego

              Introduction

              OpenStego can be used to exfiltrate data or find unauthorized usage.

              Project details

              OpenStego is written in Java.

              Strengths and weaknesses

              • + The source code of this software is available

                Typical usage

                • Data hiding
                • Watermarking

                OpenStego review

                70

                pastemon

                Introduction

                Tool like pastemon can detect specific texts on the Pastebin website, like corporate information or sensitive information. It can be used as an early warning system or detect compromises in your environment.

                Project details

                pastemon is written in Perl.

                Strengths and weaknesses

                • + The source code of this software is available
                • - Unknown project license

                Typical usage

                • Security monitoring

                pastemon review

                78

                Acra

                Introduction

                Acra is a database encryption proxy that provides encryption and data leakage prevention to applications. It provides selective encryption, access control, database and data leak prevention, and even intrusion detection capabilities. It is focused on developers and supports most popular programming languages such as Go, PHP, Python, Ruby.

                Project details

                Acra is written in Golang, Node.js, Objective-C, PHP, Python, Ruby.

                Strengths and weaknesses

                • + Commercial support available
                • + The source code of this software is available

                  Typical usage

                  • Data encryption
                  • Data leak prevention
                  • Data security
                  • Vulnerability mitigation

                  Acra review

                  64

                  BuQuikker

                  Introduction

                  BuQuikker is a security tool to scan the Amazon S3 storage service. Its goal is to find open and unprotected S3 buckets.

                  Project details

                  BuQuikker is written in Python.

                  Strengths and weaknesses

                  • + The source code of this software is available

                    Typical usage

                    • Data leak detection
                    • Security assessment

                    BuQuikker review

                    84

                    SMBMap

                    Introduction

                    SMBMap allows scanning of file resources that are shared with the SMB protocol. The tool will list share drives, drive permissions, the share contents, upload/download functionality, file name auto-download pattern matching, and even execute remote commands. The tool was created for pentesters to simplify finding sensitive data, or at least test for it.

                    Project details

                    SMBMap is written in Python.

                    Strengths and weaknesses

                    • + The source code of this software is available

                      Typical usage

                      • Data leak detection
                      • Information gathering
                      • Penetration testing

                      SMBMap review

                      85

                      gitleaks

                      Introduction

                      Gitleaks scans the repository, including history, for secrets and other sensitive data. This can be useful for both developers as security professionals to discover any leaks.

                      Project details

                      gitleaks is written in Golang.

                      Strengths and weaknesses

                      • + More than 10 contributors
                      • + More than 3000 GitHub stars
                      • + The source code of this software is available

                        Typical usage

                        • Security assessment

                        gitleaks review

                        Some relevant tool missing as an alternative to DNSteal? Please contact us with your suggestion.