A Jekyll-based static site to track sensitive files and folders.
- Ruby (version 3.0 or higher recommended)
- Bundler
- Install dependencies:
bundle install
To build the site and host it on a local server:
bundle exec jekyll serveAccess the site at http://localhost:4000.
Add new entries as pure YAML files in the _sensitive_entries/ directory. Files should be named using the entry title with underscores replacing spaces (e.g., AWS_Credentials.yml).
Example format (AWS_Credentials.yml):
---
layout: entry
id: 1
guid: a7f3e8d2-4b1c-4a9e-8f2d-1c5b9e7a3d4f
title: AWS Credentials
location:
windows: C:\path\to\file
linux: /path/to/file
macos: /path/to/file
description: Description of the file
type: File
abuse_level: High
exploitation: Details on exploitation
tags: tag1, tag2, tag3
abuse_information: Additional abuse details
threat_actor_references:
- https://example.com/reference
---Note:
- The file name should be the title with spaces replaced by underscores
- You can generate GUIDs using online tools or command-line utilities like
uuidgen - All content is in YAML format with front matter delimiters (
---)