ODBParser is a tool to search for PII being exposed in open databases.
ONLY to be used to identify exposed PII and warn server owners of irresponsible database maintenance
OR to query databases you have permission to access!
PLEASE USE RESPONSIBLY
Wrote this as wanted to create one-stop OSINT tool for searching, parsing and analyzing open databases in order to identify leakages of PII on third-party servers. Other tools seem to either only search for open databases or dump them once you’ve identified them and then will grab data indiscriminately. Grew from function or two into what’s in this repo, so code isn’t as clean and pretty as it could be.
To identify open databases you can:
Dumping options:
Post-Processing:
Other features:
See the odbconfig.py file to specify your parameters, because really name of the game is exposing the data YOU are interested in. I provided some examples in the config file. Play around with them!
You can:
I suggest creating virtual environment for ODBParser so have no issues with incorrect module versions. Note: Tested ONLY on Python 3.7.3 and on Windows 10.
PLEASE USE RESPONSIBLY
Usage
Examples: python ODBParser.py -cn US -p 8080 -t users –elastic –shodan –csv –limit 100
python ODBParser.py -ip 192.168.2:8080 –mongo –ignorelogs –nosizelimits
Damage to-date: 0 servers parsed | 0 databases dumped | 0 records pulled
optional arguments:
-h, –help show this help message and exit
Query Options:
–shodan, -sh Add this flag if using Shodan. Specify ES or MDB w/
flags.
–binary, -be Add this flag if using BinaryEdge. Specify ES or MDB
w/ flags.
–ip , -ip Query one server. Add port like so ‘192.165.2.1:8080’
or will use default ports for each db type. Add ES or
MDB flags to specify parser.
–file , -f Load line-separated IPs from file. Add port or will
assume default ports for each db type. Add ES or MDB
flags to specify parser.
–paste, -v Query line-separated IPs from clipboard. Add port or
will assume default ports for each db type, e.g. 9200
for ES. Add ES or MDB flags to specify parser.
Shodan/BinaryEdge Options:
–limit , -l Max number of results per query. Default is
500.
–port , -p Filter by port.
–country , -cn Filter by country (two-letter country code).
–terms , -t Enter any additional query terms you want here, e.g.
‘users’
Dump Options:
–mongo, -mdb Use for IP, Shodan, BinaryEdge & Paste methods to
specify parser.
–elastic, -es Use for IP, Shodan, BinaryEdge & Paste methods to
specify parser.
–properjson, -pj Add this flag if would like out put to be proper JSON
file. Default is one JSON string object per line.
–database , -db Specify database you want to grab. For MDB must be in
format format ‘db:collection’. Use with IP arg & ‘es’
or ‘mdb’ flag
–getall, -g Get all indices regardless of fields and
collection/index names (overrides selections in config
file).
–ignorelogs Connect to a server you’ve already checked out.
–nosizelimits, -n Dump index no matter how big it is. Default max doc
count is 800,000.
–csv Convert JSON dumps into CSV format on the fly. (Puts
JSON files in backup folder in case there is issue
with coversion)
CSV/Post-processing Options:
–convertToCSV , -c Convert JSON file or folder of JSON dumps to CSVs
after the fact. Enter full path or folder name in
current working directory
–dontflatten Use if run into memory issues converting JSON files to
CSV during post-processing.
–basic Use with –convertToCSV flag if your JSON dumps are
not true JSON files, but rather line separated JSON
objects that you got from other sources.
–dontclean, -dc Choose if want to keep useless data when convert to
CSV. See docs for more info.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…