Tool and Usage
Why this tool?
Swap memory is similar to active memory and may contain sensitive details.
Examples of sensitive data artifacts:
- Login accounts and passwords
- GPG keys
- Master keys of password managers
- Email addresses
- WiFi SSID details and keys
- Samba credentials
- Other authentication details
How it works
The tool reads the swap file or files, which are often discovery via the /proc/swaps file. It then starts digging through its contents in the hunt for useful information.
Usage and audience
swap_digger is commonly used for data extraction, information gathering, or penetration testing. Target users for this tool are pentesters and security professionals.
- Command line interface
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + The source code of this software is available
Supported operating systems
Swap_digger is known to work on Linux.
Similar tools to swap_digger:
CIRCLean is a hardware solution to clean documents from untrusted USB drives and sticks. The device automatically disarms harmful documents.
Metagoofil is an information gathering tool with focus extracting any metadata from public documents.
PCredz is a tool to extract sensitive data from pcap files like credit card numbers, session information, and authentication details.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
This tool is categorized as a data excavation tool.