View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0009475 | Kali Linux | New Tool Requests | public | 2025-12-30 18:25 | 2025-12-30 18:25 |
| Reporter | root-flow | Assigned To | |||
| Priority | normal | Severity | minor | Reproducibility | have not tried |
| Status | new | Resolution | open | ||
| Summary | 0009475: [New Tool Request] Axiom-Secret-Lens - Post-Exploitation Memory Secret Scanner | ||||
| Description | Tool Name: Axiom-Secret-Lens (ASL) Author: root-flow Source Code: https://github.com/root-flow/axiom-secret-lens License: MIT General Description: Axiom-Secret-Lens (ASL) is a specialized post-exploitation tool designed to extract and validate sensitive credentials directly from running process memory. Unlike traditional scanners that target static files or Git history, ASL focuses on the runtime environment, specifically auditing /proc/[pid]/environ and process memory maps. Key Features:
Why it should be in Kali Linux: While Kali has several static secret scanners (like TruffleHog), it lacks a dedicated, lightweight tool for live memory secret discovery during the post-exploitation phase. ASL fills this gap, providing Red Teamers and penetration testers with a fast, non-intrusive method to escalate privileges or move laterally by harvesting "live" credentials. | ||||
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2025-12-30 18:25 | root-flow | New Issue |