gitslurp

command module
v1.3.9 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jun 27, 2025 License: MIT Imports: 9 Imported by: 0

README ΒΆ

gitslurp πŸ”

Go Version

gitslurp logo
OSINT tool to analyze GitHub user's commit history across repositories

Features β€’ Installation β€’ Usage β€’ Docs β€’ Contributing

A powerful command-line tool that analyzes GitHub user activity and highlights their contributions across repositories. Perfect for developers, maintainers, and anyone interested in understanding contribution patterns on GitHub.

# Quick install
go install git.sr.ht/~gnome/gitslurp@latest

# Basic usage
gitslurp soxoj

Features

  • πŸ” User-Centric Analysis: Search by GitHub username, email address or organization
  • πŸ“Š Comprehensive Commit History: View all commits made by a user across public repositories
  • 🎯 Visual Highlighting: Easily identify target user's commits with color-coding and emojis
  • πŸ‘₯ Multiple Identity Support: Detects and groups commits from different email addresses and names
  • 🐽 Advanced Secret Detection: Powered by TruffleHog-inspired regex patterns for enterprise-grade secret detection
  • ⭐ Interesting Patterns: Find URLs, UUIDs, IPs, and other interesting patterns in commit messages
  • πŸ“¦ Repository Context: Shows if commits are in user's own repositories or forks
  • 🏒 Organization Scanning: Scan entire organizations to identify employees and their commit patterns

Installation

go install git.sr.ht/~gnome/gitslurp@latest

Usage

Basic usage:

gitslurp <username>

Search by email:

gitslurp user@example.com

With GitHub token (recommended for better rate limits):

gitslurp -t <github_token> <username>
Options
  • --token, -t: GitHub personal access token (can also be set via GITSLURP_GITHUB_TOKEN environment variable)
  • --details, -d: Show detailed commit information
  • --secrets, -s: Enable TruffleHog-powered secret detection in commits 🐽
  • --interesting, -i: Show interesting findings like URLs, emails, and other patterns in commit messages
  • --all, -a: Show commits from all contributors in the target's repositories. This is useful for OSINT investigations to discover potential alternate accounts when users accidentally commit with different identities. Note: This flag is automatically enabled when scanning organizations.

Output Format

The tool provides a clear, color-coded output:

  • πŸ“ Target user's emails are marked and highlighted
  • ⭐ Target user's commits are highlighted
  • πŸ‘€ Author information is clearly displayed
  • πŸ“‚ Repository names are organized and highlighted

Example output:

πŸ“ user@example.com (Target User)
  Names used: John, John Doe
  Total Commits: 150
  πŸ“‚ Repo: example/project
    ⭐ Commit: abc123
    πŸ”— URL: https://github.com/example/project/commit/abc123
    πŸ‘€ Author: John Doe <user@example.com>

Authentication

For better rate limits and access to private repositories, use a GitHub personal access token:

  1. Create a token at https://github.com/settings/tokens
  2. Use the -t flag or set the GITSLURP_GITHUB_TOKEN environment variable

Development

Requirements:

  • Go 1.21 or higher
  • GitHub API access (token recommended)

Build from source:

git clone git@git.sr.ht:~gnome/gitslurp
cd gitslurp
go build

License

MIT License - see LICENSE file for details

Documentation ΒΆ

The Go Gopher

There is no documentation for this package.

Directories ΒΆ

Path Synopsis
internal
art
cli

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL