Lets Talk About GitLeaks!

Vikram Nayyar CS
2 min readMar 11, 2024

Introduction:

So this week’s blog post is an interesting one!

I was watching this CTF video and stumbled across an interesting tool. It definitely seems like something that can make life quite easy therefore I thought it would be worthwhile to explore further.

As always, before we get into this week’s post, be sure to applaud, comment and share with your friends.

So What is It?

I’ll leave the full details here.

But essentially, it’s a scanning tool which you can use on git repositories and it will make you aware of any vulnerabilities/”leaks”.

What Drawn My Attention to It?

Speed:

From watching the video, it’s clear that all you have to do is “use” the tool and you’re instantly made aware of vulnerabilities.

Applicable to Both Dev’s and Cyber Security Engineers:

Primarily, I’m a developer and this tool is equally applicable to developers because it helps to identify security risks (such as leaked credentials!).

What’s great about it too is that it promotes better security practises and if you ever think “great security” is too much effort then I wish you luck when dealing with the consequences of “cheap security”.

The 2 Main Commands:

Detect.

Protect.

The names are pretty self explanatory.

See here on how to use them both.

Final Things:

As always, thank you for taking the time to read this article.

I intend to cover more content about Cyber Security (not just tools) in the near future.

All my links are here.

Hashtags:

#cybersecurity #hacking #security #technology #hacker #infosec #ethicalhacking #cybercrime #tech #linux #cyber #hackers #informationsecurity #cyberattack #programming #malware #kalilinux #privacy #cybersecurityawareness #coding #datasecurity #dataprotection #python #ethicalhacker #hack #it #computerscience #pentesting #informationtechnology #business

--

--