pwndb.py is a python command-line tool for searching leaked credentials using the Onion service with the same name. In this post I’ll describe all the possible options.
Disclaimer
[!] Legal disclaimer: Usage of pwndb.py for attacking targets without
prior mutual consent is illegal. It is the end user's responsibility
to obey all applicable local, state and federal laws. Developers assume
no liability and are not responsible for any misuse or damage caused.
Using a single email:
$ python pwndb.py --target testing@email.com
Using a domain name:
$ python pwndb.py --target @testing.com
Using a file:
Example file:
juanpapafrancisco@gmail.com, romeoyjulietasantos@hotmail.com, dddd@email.com.do
jhonpope@vatican.com
friend@email.com, John Smith <john.smith@email.com>, Jane Smith <jane.smith@uconn.edu>
$ python pwndb.py --list targets_example.txt
Using %:
$ python pwndb.py --target testing.%
0 Comments