View Issue Details

IDProjectCategoryView StatusLast Update
0009475Kali LinuxNew Tool Requestspublic2025-12-30 18:25
Reporterroot-flow Assigned To 
PrioritynormalSeverityminorReproducibilityhave not tried
Status newResolutionopen 
Summary0009475: [New Tool Request] Axiom-Secret-Lens - Post-Exploitation Memory Secret Scanner
Description

Tool Name: Axiom-Secret-Lens (ASL) Author: root-flow Source Code: https://github.com/root-flow/axiom-secret-lens License: MIT

General Description: Axiom-Secret-Lens (ASL) is a specialized post-exploitation tool designed to extract and validate sensitive credentials directly from running process memory. Unlike traditional scanners that target static files or Git history, ASL focuses on the runtime environment, specifically auditing /proc/[pid]/environ and process memory maps.

Key Features:

Live Memory Auditing: Identifies secrets (AWS Keys, GitHub PATs, Slack Tokens, etc.) that only exist in RAM during execution, bypassing disk-based detection and forensic cleanup.

Integrated Validation Engine: Features a built-in module to verify the status of discovered tokens against their respective cloud APIs (e.g., Slack auth.test, GitHub API).

Zero Dependency: Written in pure Python 3 without external library requirements, ensuring maximum portability on compromised systems.

Standardized Debian Structure: The repository includes a compliant debian/ directory (control, install) for seamless packaging and maintenance within the Kali Linux distribution.

Why it should be in Kali Linux: While Kali has several static secret scanners (like TruffleHog), it lacks a dedicated, lightweight tool for live memory secret discovery during the post-exploitation phase. ASL fills this gap, providing Red Teamers and penetration testers with a fast, non-intrusive method to escalate privileges or move laterally by harvesting "live" credentials.

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2025-12-30 18:25 root-flow New Issue