The dataset is currently empty. Upload or create new data files. Then, you will be able to explore them in the Dataset Viewer.
π GEARZ LeakFinder
Redaction-first OSINT hunting tool β scan code repos, package registries, Docker images, CI/CD logs, and archived web captures for accidentally leaked secrets.
Built for bug bounty pros, red teamers, and learners who want to see how real leaks are uncovered (safely, with redaction).
β¨ Features
- Adapters: GitHub β’ Wayback Machine β’ DockerHub β’ npm β’ PyPI β’ CI/CD logs
- Scope Builder UI: point-and-click to define your targets β auto-saves to
scope.yaml - Redaction by default: sensitive values are masked before logging
- Tutor Mode: step-by-step explanations of whatβs happening
- AI Summaries: results are explained in plain language by local or hosted LLMs
- Export Pack: one-click download of JSONL findings, AI summary, and Merkle audit
- Live Logs: stream engine output directly in the UI
- Theme toggle: dark, dim, or sunburst modes
π οΈ Setup
- Clone and install
git clone https://github.com/Gearsoldier/gearz-leakfinder.git cd gearz-leakfinder npm install Auth tokens
GitHub: Generate a Personal Access Token (classic, public_repo scope is enough).
Hugging Face: HF_TOKEN for AI summaries.
Export tokens into your shell (add to ~/.bashrc for permanence):
export GITHUB_TOKEN=ghp_xxxxx export HF_TOKEN=hf_xxxxx Start UI
npm run dev Open β http://localhost:3000
π― Usage
- Build your scope From the UI:
GitHub: orgs, repos, or full repo URLs
Wayback: domains or URLs to pull archived pages
DockerHub: orgs/users or full hub URLs
npm / PyPI: scopes or prefixes (@org, org-, org)
CI/CD: artifact or log URLs
APK / IPA: package or bundle IDs
Click Save Scope β writes scope.yaml.
- Run a scan In the Engine Scan panel:
Select adapters (e.g., github, wayback, dockerhub)
Toggle Redact secrets β
Adjust concurrency (default: 6)
Click Run scan + AI summary
Logs stream live; results are written into ./data/out/.
- Review results findings.jsonl β machine-readable findings
findings.sarif.json β import into security dashboards
summary.md β AI-generated analysis for humans
Export everything with one click: Download Export Pack
β‘ Example Scope (Mozilla Bug Bounty)
github: targets: - "mozilla" - "mozilla-mobile" - "mozilla-services" - "mozilla-releng" - "mozilla-iot"
wayback: targets: - "github.com/mozilla" - "hg.mozilla.org" - "archive.mozilla.org"
dockerhub: targets: - "mozilla"
npm: targets: - "@mozilla" - "mozilla-*"
pypi: targets: - "mozilla*" π¦ Roadmap Custom regex packs (user-supplied)
Multi-engine federation (run several adapters in parallel clusters)
Timeline mode for Wayback leaks
Export directly to HackerOne / Bugcrowd report templates
Preset scopes for popular programs (Mozilla, Google, etc.)
β οΈ Disclaimer This tool is for educational and defensive research only. Use it only on assets that are in-scope and authorized by a bug bounty program or your own organization. Never target systems you donβt have permission to test.
Made with π§‘ by the GEARZ crew (solo dev, me and a cat π).
- Downloads last month
- 12