Pillager – Filesystems For Sensitive Information With Go
Sometimes after gaining access to the system in the network we won’t find any sensitive information. So to get the information on the target or victimized machine we can use the Pillager tool. Pillager tool is an automated cyber security tool that provides the scanning of directories recursively for sensitive information in files. This tool can be helpful in retrieving API keys, Credentials, hashes, and much more information. This tool is developed in the Golang Language with the best response time. The tool is available on the GitHub platform for free.
Note: Make Sure You have Golang Installed on your System, as this is a golang-based tool. Click to check the Installation process: Golang Installation Steps on Linux
Installation of Pillager Tool on Kali Linux OS
Step 1: Use the following command to install the tool in your Kali Linux operating system.
git clone https://github.com/brittonhayes/pillager.git
Step 2: Now use the following command to move into the directory of the tool. You have to move in the directory in order to run the tool.
cd pillager/cmd/pillager
Step 3: You are in the directory of the pillager. Now you have to install the tool by using the following command.
go build
Step 4: All the dependencies have been installed in your Kali Linux operating system. Now use the following command to run the tool and check the help section.
pillager -h
Working with Pillager Tool on Kali Linux OS
Example 1: Basic Scan
pillager hunt .
In this example, we are scanning the current directory for sensitive information.
Example 2: Verbose Output
pillager hunt . -v
In this example, we have used the -v flag for displaying the output in a more readable form.