Open In App

Pillager – Filesystems For Sensitive Information With Go

Last Updated : 27 Jan, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

Sometimes after gaining access to the system in the network we won’t find any sensitive information. So to get the information on the target or victimized machine we can use the Pillager tool. Pillager tool is an automated cyber security tool that provides the scanning of directories recursively for sensitive information in files. This tool can be helpful in retrieving API keys, Credentials, hashes, and much more information. This tool is developed in the Golang Language with the best response time. The tool is available on the GitHub platform for free.

Note: Make Sure You have Golang Installed on your System, as this is a golang-based tool. Click to check the Installation process: Golang Installation Steps on Linux

Installation of Pillager Tool on Kali Linux OS

Step 1: Use the following command to install the tool in your Kali Linux operating system.

git clone https://github.com/brittonhayes/pillager.git

Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.

cd pillager/cmd/pillager

Step 3: You are in the directory of the pillager. Now you have to install the tool by using the following command.

go build

Step 4: All the dependencies have been installed in your Kali Linux operating system. Now use the following command to run the tool and check the help section.

pillager -h

Working with Pillager Tool on Kali Linux OS

Example 1: Basic Scan

pillager hunt .

In this example, we are scanning the current directory for sensitive information.

Example 2: Verbose Output

pillager hunt . -v

In this example, we have used the -v flag for displaying the output in a more readable form.


Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads