Karma : Find Leaked Emails with Your Passwords

Karma is a tool used for find leaked emails with your passwords. Usage this program for attacking targets without prior consent is illegal.

It’s the end user’s responsibility to obey allapplicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

Also Read – Decker : Declarative Penetration Testing Orchestration Framework

Install

sudo apt install tor python3 python3-pip
sudo service tor start
git clone https://github.com/decoxviii/karma.git ; cd karma
sudo -H pip3 install -r requirements.txt
python3 bin/karma.py –help

Tests

All the tests were done in Debian/Ubuntu.

  • Search emails with the password: 12345678

python3 bin/karma.py search ‘123456789’ –password -o test1

  • Search emails with the local-part: johndoe

python3 bin/karma.py search ‘johndoe’ –local-part -o test2

  • Search emails with the domain: hotmail.com

python3 bin/karma.py search ‘hotmail.com’ –domain -o test3

  • Search email password: johndoe@unknown.com

python3 bin/karma.py target ‘johndoe@unknown.com’ -o test4

R K

Recent Posts

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

17 hours ago

ROADTools: The Modern Azure AD Exploration Framework

ROADTools is a powerful framework designed for exploring and interacting with Microsoft Azure Active Directory…

4 days ago

How to Enumerate Microsoft 365 Groups Using PowerShell and Python

Microsoft 365 Groups (also known as M365 Groups or Unified Groups) are at the heart…

4 days ago

SeamlessPass: Using Kerberos Tickets to Access Microsoft 365

SeamlessPass is a specialized tool designed to leverage on-premises Active Directory Kerberos tickets to obtain…

5 days ago

PPLBlade: Advanced Memory Dumping and Obfuscation Tool

PPLBlade is a powerful Protected Process Dumper designed to capture memory from target processes, hide…

5 days ago

HikPwn : Simple Scanner For Hikvision Devices With Basic Vulnerability Scanning

HikPwn: Comprehensive Guide to Scanning Hikvision Devices for Vulnerabilities If you’re searching for an efficient…

6 days ago