Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course

Memory Analysis with TruffleHog

This course demonstrates how to detect exposed credentials using TruffleHog, map findings to MITRE ATT&CK and SHIELD techniques, and perform file and repository analysis using entropy and regex-based secret scanning.

Beginner
37m

Created by Corey Thompson

Last Updated Feb 18, 2026

Course Thumbnail
  • Course

Memory Analysis with TruffleHog

This course demonstrates how to detect exposed credentials using TruffleHog, map findings to MITRE ATT&CK and SHIELD techniques, and perform file and repository analysis using entropy and regex-based secret scanning.

Beginner
37m

Created by Corey Thompson

Last Updated Feb 18, 2026

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Secrets exposure remains a common and high-impact security risk, often enabling attackers to access sensitive data or move deeper into an environment. In this course, Memory Analysis with TruffleHog, you will learn how to detect and investigate exposed credentials across source code, repositories, and local file systems using practical secret-scanning techniques. First, you will examine how attackers abuse leaked credentials and how these exposures align with MITRE ATT&CK techniques related to unsecured credentials and data discovery. Next, you will configure and use TruffleHog to scan Git repositories and file systems, identifying secrets through entropy analysis and regex-based detection. Finally, you will analyze and validate findings, assess exposure risk, and map detections to MITRE SHIELD techniques focused on file and memory analysis. By the end of this course, you will have the skills to use TruffleHog in real-world incident response, threat hunting, and detection workflows, enabling you to identify exposed secrets, understand their impact, and apply structured defensive analysis.

Memory Analysis with TruffleHog
Beginner
37m
Table of contents

About the author
Corey Thompson - Pluralsight course - Memory Analysis with TruffleHog
Corey Thompson
5 courses 0.0 author rating 0 ratings

Corey is a cybersecurity expert with years of experience. He specializes in threat analysis and red teaming, helping organizations identify vulnerabilities through simulated attacks.

2025 Forrester Wave™ names Pluralsight as a Leader among tech skills dev platforms

See how our offering and strategy stack up.

forrester wave report