DNSteal alternatives

Looking for an alternative tool to replace DNSteal? During the review of DNSteal we looked at other open source tools. Based on their category, tags, and text, these are the ones that have the best match.

Top 3

  1. DET (data loss prevention testing)
  2. AIL framework (framework to parse data of information leaks)
  3. GitMiner (Git data miner)

These tools are ranked as the best alternatives to DNSteal.

Alternatives (by score)

64

DET

Introduction

This tool can be used to identify possible DLP failures. It uses different data exfiltration techniques, which could (or not) trigger a DLP solution.

Project details

DET is written in Python.

Strengths and weaknesses

  • + The source code of this software is available
  • - No releases on GitHub available

Typical usage

  • Learning
  • Penetration testing

DET review

85

AIL framework

Introduction

AIL is a modular framework which helps to analyze potential information leaks. The framework is flexible and supports different kinds of data formats and sources. For example, one of the sources is the collection of pastes from Pastebin. A tool like AIL is commonly used to detect or even prevent data leaks.

Project details

AIL framework is written in Python.

Strengths and weaknesses

  • + More than 10 contributors
  • + The source code of this software is available

    Typical usage

    • Data extraction
    • Data leak detection
    • Information leak detection
    • Security monitoring

    AIL framework review

    60

    GitMiner

    Introduction

    GitMiner is a tool to scan for sensitive data that is leaked via software repositories. Examples of sensitive data are authentication details such as passwords or connection settings.

    Project details

    GitMiner is written in Python.

    Strengths and weaknesses

    • + More than 1000 GitHub stars
    • + The source code of this software is available

      Typical usage

      • Asset discovery
      • Discovery of sensitive information
      • Information leak detection

      GitMiner review

      76

      git-secrets

      Introduction

      You would most likely use git-secrets in development teams or as an individual developer. The primary goal is to prevent accidentally submitting authentication details or otherwise sensitive information to your software repositories.

      Project details

      git-secrets is written in shell script.

      Strengths and weaknesses

      • + The source code of this software is available

        Typical usage

        • Data leak prevention
        • Information leak prevention

        git-secrets review

        74

        OpenStego

        Introduction

        OpenStego can be used to exfiltrate data or find unauthorized usage.

        Project details

        OpenStego is written in Java.

        Strengths and weaknesses

        • + The source code of this software is available

          Typical usage

          • Data hiding
          • Watermarking

          OpenStego review

          93

          Acra

          Introduction

          Acra is a database encryption proxy that provides encryption and data leakage prevention to applications. It provides selective encryption, access control, database and data leak prevention, and even intrusion detection capabilities. It is focused on developers and supports most popular programming languages such as Go, PHP, Python, Ruby.

          Project details

          Acra is written in Golang, Node.js, Objective-C, PHP, Python, Ruby.

          Strengths and weaknesses

          • + Commercial support available
          • + The source code of this software is available

            Typical usage

            • Data encryption
            • Data leak prevention
            • Data security
            • Vulnerability mitigation

            Acra review

            64

            BuQuikker

            Introduction

            BuQuikker is a security tool to scan the Amazon S3 storage service. Its goal is to find open and unprotected S3 buckets.

            Project details

            BuQuikker is written in Python.

            Strengths and weaknesses

            • + The source code of this software is available

              Typical usage

              • Data leak detection
              • Security assessment

              BuQuikker review

              85

              gitleaks

              Introduction

              Gitleaks scans the repository, including history, for secrets and other sensitive data. This can be useful for both developers as security professionals to discover any leaks.

              Project details

              gitleaks is written in Golang.

              Strengths and weaknesses

              • + More than 10 contributors
              • + More than 3000 GitHub stars
              • + The source code of this software is available

                Typical usage

                • Security assessment

                gitleaks review

                60

                SMBMap

                Introduction

                SMBMap allows scanning of file resources that are shared with the SMB protocol. The tool will list share drives, drive permissions, the share contents, upload/download functionality, file name auto-download pattern matching, and even execute remote commands. The tool was created for pentesters to simplify finding sensitive data, or at least test for it.

                Project details

                SMBMap is written in Python.

                Strengths and weaknesses

                • + The source code of this software is available

                  Typical usage

                  • Data leak detection
                  • Information gathering
                  • Penetration testing

                  SMBMap review

                  84

                  aiodnsbrute (Async DNS Brute)

                  Introduction

                  When a project requires resolving or guessing host names, then this tool is a great addition to the toolkit. It focuses on 'fast' by using asynchronous operations. The list of names to try is provided with a wordlist.

                  Project details

                  aiodnsbrute is written in Python.

                  Strengths and weaknesses

                  • + Very low number of dependencies
                  • + The source code of this software is available

                    Typical usage

                    • Network scanning
                    • Penetration testing

                    aiodnsbrute review

                    63

                    DNSChef

                    Introduction

                    DNSChef is a DNS proxy that can be used terminate or intercept traffic for DNS traffic. This might be useful during a penetration test or when researching malware and manipulate the actual DNS responses.

                    Project details

                    84

                    Fierce

                    Introduction

                    Fierce is a security tool that helps with DNS reconnaissance. It can locate non-contiguous IP space, but using DNS information.

                    Project details

                    Fierce is written in Python.

                    Strengths and weaknesses

                    • + The source code of this software is available

                      Typical usage

                      • Information gathering
                      • Reconnaissance
                      • Security assessment

                      Fierce review

                      64

                      QuickScan

                      Introduction

                      Although there are many port scanning utilities, sometimes it is specific functionality that makes a tool really powerful. For example, QuickScan saves the results of a scan, which then can be processed later for follow-up.

                      Project details

                      QuickScan is written in Python.

                      Strengths and weaknesses

                      • + Very low number of dependencies
                      • + The source code of this software is available
                      • - No releases on GitHub available
                      • - Full name of author is unknown

                      Typical usage

                      • Network scanning

                      QuickScan review

                      60

                      SubBrute (subdomain-bruteforcer)

                      Introduction

                      SubBrute is a DNS meta-query spider that enumerates DNS records and subdomains. This can be useful during penetration tests and security assessments.

                      Project details

                      SubBrute is written in Python.

                      Strengths and weaknesses

                      • + More than 1000 GitHub stars
                      • + The source code of this software is available
                      • - Full name of author is unknown

                      Typical usage

                      • Information gathering
                      • Penetration testing
                      • Security assessment

                      SubBrute review

                      60

                      SubFinder

                      Introduction

                      SubFinder is a tool to scan domains and discover subdomains. This may be useful during the reconnaissance phase of penetration testing where information is collected. Some subdomains may reveal sensitive data or point to interesting targets such as a backup location.

                      Project details

                      SubFinder is written in Golang.

                      Strengths and weaknesses

                      • + Tool is modular and extendable
                      • + More than 500 GitHub stars
                      • + The source code of this software is available

                        Typical usage

                        • Discovery of sensitive information
                        • Information gathering
                        • Penetration testing
                        • Reconnaissance
                        • Security assessment

                        SubFinder review

                        70

                        pastemon

                        Introduction

                        Tool like pastemon can detect specific texts on the Pastebin website, like corporate information or sensitive information. It can be used as an early warning system or detect compromises in your environment.

                        Project details

                        pastemon is written in Perl.

                        Strengths and weaknesses

                        • + The source code of this software is available
                        • - Unknown project license

                        Typical usage

                        • Security monitoring

                        pastemon review

                        Some relevant tool missing as an alternative to DNSteal? Please contact us with your suggestion.