Kali Linux

Gitbleed_Tools : For Extracting Data From Mirrorred Git Repositories

Gitbleed_Tools, this repo contains shell scripts that can be used to download and analyze differences between cloned and mirror Git repositories. For more information about the underlying quirk in Git behavior, please visit read our blog post.

What Do These Scripts Do?

These scripts will clone a copy of the given Git repository, both as regular clone and mirrored (“–mirror”) option. It will then create a delta between the two, seeking to find the parts of the repository that are only available in mirror mode. Last, gitleaks will be run to see if any secrets are present in the delta portion, and “git log” will be used to create a single file containing the bodies of the commits so they can be analyzed easier.

Please note that since this script creates three copies of the repository, it may consume a lot of disk space.

Example repositories

You can test these tools on the following two example repositories:

  • gb_testrepo_delete – repository hiding secrets via deleted commits
  • gb_testrepo_reset – repository hiding secrets via “git reset”

Requirements

You will need Git, Python 3. GitLeaks and git-filter-repo to be installed. Here is an example of installing these on MacOS:

brew install git python3 gitleaks git-filter-repo

How to Install and Run

You can run this againt a repository as follows:

git clone https://github.com/nightwatchcybersecurity/gitbleed_tools.git
cd gitbleed_tools
./gitbleed.sh https://github.com/nightwatchcybersecurity/gitbleed_tools.git example

This will create an example folder containing three subfolders:

  • clone – contains the cloned repository
  • delta – contains the mirrrored repository minus all of the commits in the “clone”
  • mirror – contains the mirrored repository cloned with the “–mirror” option

There are also three files created:

  • clone_hashes.done.txt – list of hashes in the cloned repository
  • gitleaks.json – results from running gitleaks
  • gitlog.txt – all commits from the delta folder concatenated into a single file
R K

Recent Posts

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

2 weeks ago

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

2 weeks ago

The Evolution of Online Finance Tools In a Tech-Driven World

In an era defined by technological innovation, the way people handle and understand money has…

2 weeks ago

A Complete Guide to Lenso.ai and Its Reverse Image Search Capabilities

The online world becomes more visually driven with every passing year. Images spread across websites,…

2 weeks ago

How Web Application Firewalls (WAFs) Work

General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…

2 months ago

How to Send POST Requests Using curl in Linux

How to Send POST Requests Using curl in Linux If you work with APIs, servers,…

2 months ago