EMAGNET : Leaked Databases With 97.1% Accurate To Grab Mail + Password

Emagnet is a very powerful tool for it’s purpose which is to capture email addresses and passwords from leaked databases uploaded on pastebin. It’s almost impossible to find leaked passwords when they are out of list on pastebin.com.

Either they have been deleted by pastebin’s techs or the uploads is just one in the crowd. To be honest it’s easier to find a needle in a haystack then find outdated uploads on pastebin with the data we want to collect.

Known Issues That Will Be Fixed In Next Push!

  • SSH Bruterforcer isn’t completely working anymore
  • Requirements packages for android devices when using termux app isn’t working with brute force tools + screen
  • Sending wrong data into emagnet.log for which files that contains correct data

Also Read – Wordlister : A Simple Wordlist Generator & Mangler Written In Python

TIPS

Bruteforce on your own risk.

For people that like things sorted. If you have some some archive with leaked databases stored (or small) on your harddrive but you are to lazy to figure out how to try if they work on spotify or gmail for example, then just create a a random text file in “$HOME/.config/emagnet/tmp/some-random-file” – Add all logins as: mail:password one per line –

Now just run emagnet as usual and you will bruteforce all accounts you added to the file and all cracked accounts will be stored in log dirs! Once done, you will have a good list for accounts that actually works for real or at least you know which accounts you can put at top of your text file that you know is legit.

Don’t forget to use vpn, tor or just edit curl command if you want to use a socks5 proxy / ssh tunnel: For a socks5 proxy use: curl –socks5-hostname localhost:port …… and for tor use curl –socks5 127.0.0.1:9150 ……

Demo – How it works

Left side is how you see it – Right side is what actually happening in the background

Get Started On Linux/MacOSX

git clone https://github.com/wuseman/emagnet
cd emagnet
chmod +x emagnet*
.
./emagnet –emagnet

Get started on Android via Termux

See video here

  • Download termux from play store here

Once installed, copy and paste below commands:

echo -e ‘
pkg update
pkg upgrade -y
pkg install wget curl git -y
git clone https://github.com/wuseman/emagnet
cd emagnet
bash emagnet –emagnet’ > emagnet-termux.sh
bash emagnet-termux.sh

Notice

Attacking different kinds of accounts via emagnet that you have not been granted or allowed to attack is strictly prohibited and it breaks the law. The punishment is hard and you can even get into prison in some countries just for trying to attack for intrusion.

With this said, it’s important that all users is aware of this and when you have cloned or downloaded it’s fully up to every user to take responsibility over their own actions. wuseman cannot be held responsible for the actions of any user, all users using Emagnet on their own responsibility.

Developer: “All my previews where a brute force attack has been done is under controlling forms with 100% fully permissions by the owners. If you have any questions about this then you are welcome to contact me or the owner.”

Haters Gonna Hate

If you are one of these who dislikes EMAGNET and believe the program has been developed for a reason that would break the law then I am not interested in taking part of your opinions, keep them for yourself! Emagnet does NOT leak any data at all either to the developer(s) or anyone else.

No statistics at all to track any user so if you want to contact me for ask who it might was who downloaded emagnet a specific date is completely useless since i really have no idea, and to be honest I don’t care.

Feel free to read the history about emagnet here and how everything started about this project.

Development of emagnet is active and is updated frequently, please use the latest version if you report issues/bugs.

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago