Search for leaked creadentials: Pwndb

pwndb

pwndb.py is a python command-line tool for searching leaked credentials using the Onion service with the same name. In this post I’ll describe all the possible options.

Disclaimer

[!] Legal disclaimer: Usage of pwndb.py for attacking targets without
prior mutual consent is illegal. It is the end user's responsibility
to obey all applicable local, state and federal laws. Developers assume
no liability and are not responsible for any misuse or damage caused.

Using a single email:

$ python pwndb.py --target testing@email.com
single-email

Using a domain name:

$ python pwndb.py --target @testing.com
domain-name

Using a file:

Example file:
juanpapafrancisco@gmail.com, romeoyjulietasantos@hotmail.com, dddd@email.com.do
jhonpope@vatican.com
friend@email.com, John Smith <john.smith@email.com>, Jane Smith <jane.smith@uconn.edu>
$ python pwndb.py --list targets_example.txt
file

Using %:


$ python pwndb.py --target testing.%
wildcard

Post a Comment

0 Comments