pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps. Haveibeenpwned offers a lot of information about the compromised email, some useful information is displayed by this script:
And with all this information it can easily find passwords for compromised emails if the dump is accessible and it contains the password
Also Read – Iris : WinDbg Extension To Display Windows Process Mitigations
Ubuntu / Kali Linux / Nethunter / Termux
git clone https://github.com/thewhiteh4t/pwnedOrNot.git
cd pwnedOrNot
pip3 install requests
BlackArch Linux
pacman -S pwnedornot
cd pwnedOrNot
git pull
Usage
python3 pwnedornot.py -h
Usage: pwnedornot.py [-h] [-e EMAIL] [-f FILE] [-d DOMAIN] [-n] [-l]
[-c CHECK]
Optional arguments:
-h, –help show this help message and exit
-e EMAIL, –email EMAIL Email Address You Want to Test
-f FILE, –file FILE Load a File with Multiple Email Addresses
-d DOMAIN, –domain DOMAIN Filter Results by Domain Name
-n, –nodumps Only Check Breach Info and Skip Password Dumps
-l, –list Get List of all pwned Domains
-c CHECK, –check CHECK Check if your Domain is pwned
==> Examples
==> Check Single Email
python3 pwnedornot.py -e
==> OR
python3 pwnedornot.py –email
==> Check Multiple Emails from File
python3 pwnedornot.py -f
==> OR
python3 pwnedornot.py –file
==> Filter Result for a Domain Name [Ex : adobe.com]
python3 pwnedornot.py -e -d
==> OR
python3 pwnedornot.py -f –domain
==> Get only Breach Info, Skip Password Dumps
python3 pwnedornot.py -e -n
==> OR
python3 pwnedornot.py -f –nodumps
==> Get List of all Breached Domains
python3 pwnedornot.py -l
==> OR
python3 pwnedornot.py –list
==> Check if a Domain is Pwned
python3 pwnedornot.py -c
==> OR
python3 pwnedornot.py –check
Video Tutorial
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…