Karma : Find Leaked Emails with Your Passwords

Karma is a tool used for find leaked emails with your passwords. Usage this program for attacking targets without prior consent is illegal.

It’s the end user’s responsibility to obey allapplicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

Also Read – Decker : Declarative Penetration Testing Orchestration Framework

Install

sudo apt install tor python3 python3-pip
sudo service tor start
git clone https://github.com/decoxviii/karma.git ; cd karma
sudo -H pip3 install -r requirements.txt
python3 bin/karma.py –help

Tests

All the tests were done in Debian/Ubuntu.

  • Search emails with the password: 12345678

python3 bin/karma.py search ‘123456789’ –password -o test1

  • Search emails with the local-part: johndoe

python3 bin/karma.py search ‘johndoe’ –local-part -o test2

  • Search emails with the domain: hotmail.com

python3 bin/karma.py search ‘hotmail.com’ –domain -o test3

  • Search email password: johndoe@unknown.com

python3 bin/karma.py target ‘johndoe@unknown.com’ -o test4

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

13 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

13 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

13 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

13 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

13 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

16 hours ago