A Python script for searching through files in a directory to find patterns that resemble security flags, commonly used in Capture The Flag (CTF) competitions or as markers for sensitive data.
- Search through all files in a specified directory and subdirectories
- Contained 200 flag formats
- Allow users to input custom flag formats
- Utilize multithreading for improved search performance
Before you begin, ensure you have met the following requirements:
- Python 3.x installed on your system
- tqdm library installed (can be installed via
pip install tqdm
Clone the repository to your local machine:
git clone https://github.com/Alndhkordi/DS_Store-Flag-Finder.git
cd DS_Store_Flag_Finder
1-Run the script using Python : python DS_Store_Flag_Finder.py
2-When prompted, enter the path to the directory you want to search exp(C:\Users\Desktop\logss) and provide a custom flag format or just hit enter and let the tool use the default format.
3-The script will display any found flags in the terminal and provide a summary at the end.
Contributions to the DS_Store Flag Finder are welcome.
Distributed under the MIT License.
#Contact -Alnd H Kordi -https://twitter.com/Alnd_kordi -https://t.me/exploit0dayz