BaseQuery : A Way To Organize Public Combo-Lists And Leaks In A Way That You Can Easily Search Through Everything

BaseQuery is a way to organize public combo-lists and leaks in a way that you can easily search through everything.

Your private data is being traded and sold all over the internet as we speak. Tons of leaks come out on a daily basis which can make you feel powerless. The majority of user-passwords and other sensitive information have been posted somewhere on the internet/darknet for any prying eyes to see, whether you like it or not.

To take more control of what personal info is out there you can use Haveibeenpwned to narrow down which breaches your information has been exposed in. This is a great start but what if you want to know exactly what information of yours other people have access to? BaseQuery is an all in one program that makes importing and searching through thousands of data-breaches easy.

Features Included

  • A 4x nested storage structure
  • Average import speeds of 12,000+ entries per second (Intel Core i7-7700HQ CPU @ 2.8GHz)
  • Instantaneous querying system
  • Facebook’s zstd lossless compression algorithm to reduce the size of the data (On average reduces the data to less than 10% of the original size)
  • Calculate the time all your files will take to import based on your specific hardware
  • Duplicate data protection
  • Output all of your findings in a standard format
  • Email harvesting built-in

Installing

To Install BaseQuery type the following commands

git clone https://github.com/g666gle/BaseQuery.git
sudo chmod 755 -R BaseQuery/
cd BaseQuery
./dependencies.sh
./run.sh

Also Read – Netstat2Neo4J : Netstat Visualization With Neo4j

Getting Started

  • Place any databases that you have into the “PutYourDataBasesHere” folder
    • As of right now, BaseQuery can only accept files in the format where each line is colon seperated “test@example.com:password” or “password:test@example.com
    • It doesn’t matter if the line formats are mixed up within the same file. Ex) The first line may be “email:password” and the second line can be “password:email”
    • One entry per line!!
    • If you need a better visual there is an example.txt file in the folder “PutYourDataBasesHere”
    • You should delete the example file before running the program.
  • Now that you have all of your files in the correct folder
    • Open up a terminal in the BaseQuery directory.
    • Type ./dependencies.sh to install all of the resources needed ( You only need to do this once )
    • Type ./run.sh to start the program
    • Note that if you are using a laptop make sure it is plugged in. Importing databases uses A LOT of processing power and will make the import 4 times faster on average!
  • Follow the instructions on the screen
    • That’s it, enjoy!
    • Contact me with any issues.

Import Times Based on Hardware Specifics

Query Options

Prerequisites

Note: All of these are automatically installed using the ‘dependencies.sh’ script

Update packages: (sudo apt-get update)

Python Version 3.6+ (sudo apt-get install python3.7)
Bash 4+
tar (sudo apt-get install tar)
zstd (sudo apt-get install zstd)
xterm (sudo apt-get install xterm)

Built With

  • Ubuntu 18.04 bionic
  • Bash Version: GNU bash, version 4.4.19(1)-release (x86_64-pc-linux-gnu)
  • Python Version: 3.7.1

Disclaimer

READ UP ON YOUR LOCAL LAWS FIRST BEFORE USING THIS PROGRAM. I TAKE NO RESPONSIBILITY FOR ANYTHING YOU DO WITH BASEQUERY. UNDER NO CIRCUMSTANCE SHOULD BASEQUERY BE USED FOR ILLEGAL PURPOSES.

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago