pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps. Haveibeenpwned offers a lot of information about the compromised email, some useful information is displayed by this script:
And with all this information it can easily find passwords for compromised emails if the dump is accessible and it contains the password
Also Read – Iris : WinDbg Extension To Display Windows Process Mitigations
Ubuntu / Kali Linux / Nethunter / Termux
git clone https://github.com/thewhiteh4t/pwnedOrNot.git
cd pwnedOrNot
pip3 install requests
BlackArch Linux
pacman -S pwnedornot
cd pwnedOrNot
git pull
Usage
python3 pwnedornot.py -h
Usage: pwnedornot.py [-h] [-e EMAIL] [-f FILE] [-d DOMAIN] [-n] [-l]
[-c CHECK]
Optional arguments:
-h, –help show this help message and exit
-e EMAIL, –email EMAIL Email Address You Want to Test
-f FILE, –file FILE Load a File with Multiple Email Addresses
-d DOMAIN, –domain DOMAIN Filter Results by Domain Name
-n, –nodumps Only Check Breach Info and Skip Password Dumps
-l, –list Get List of all pwned Domains
-c CHECK, –check CHECK Check if your Domain is pwned
==> Examples
==> Check Single Email
python3 pwnedornot.py -e
==> OR
python3 pwnedornot.py –email
==> Check Multiple Emails from File
python3 pwnedornot.py -f
==> OR
python3 pwnedornot.py –file
==> Filter Result for a Domain Name [Ex : adobe.com]
python3 pwnedornot.py -e -d
==> OR
python3 pwnedornot.py -f –domain
==> Get only Breach Info, Skip Password Dumps
python3 pwnedornot.py -e -n
==> OR
python3 pwnedornot.py -f –nodumps
==> Get List of all Breached Domains
python3 pwnedornot.py -l
==> OR
python3 pwnedornot.py –list
==> Check if a Domain is Pwned
python3 pwnedornot.py -c
==> OR
python3 pwnedornot.py –check
Video Tutorial
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
If you are working with Linux or writing bash scripts, one of the most common…
What is a bash case statement? A bash case statement is a way to control…
Why Do We Check Files in Bash? When writing a Bash script, you often work…