LSE toolsLSE toolsswap_digger (410)swap_digger (410)

Tool and Usage

Project details
Programming languageshell script
AuthorEmeric Nasi
Latest release1.0 []

Project health

This score is calculated by different factors, like project age, last release date, etc.

Why this tool?

Swap memory is similar to active memory and may contain sensitive details.

Examples of sensitive data artifacts:

  • Login accounts and passwords
  • GPG keys
  • Master keys of password managers
  • Email addresses
  • WiFi SSID details and keys
  • Samba credentials
  • Other authentication details

How it works

The tool reads the swap file or files, which are often discovery via the /proc/swaps file. It then starts digging through its contents in the hunt for useful information.

Usage and audience

swap_digger is commonly used for data extraction, information gathering, or penetration testing. Target users for this tool are pentesters and security professionals.


  • Command line interface

Tool review and remarks

The review and analysis of this project resulted in the following remarks for this security tool:


  • + The source code of this software is available

Author and Maintainers

Swap_digger is under development by Emeric Nasi.


Supported operating systems

Swap_digger is known to work on Linux.

swap_digger alternatives

Similar tools to swap_digger:



CIRCLean is a hardware solution to clean documents from untrusted USB drives and sticks. The device automatically disarms harmful documents.



Metagoofil is an information gathering tool with focus extracting any metadata from public documents.



PCredz is a tool to extract sensitive data from pcap files like credit card numbers, session information, and authentication details.

All swap_digger alternatives

This tool page was updated at . Found an improvement? Help the community by submitting an update.

Related tool information


This tool is categorized as a data excavation tool.