pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps. Haveibeenpwned offers a lot of information about the compromised email, some useful information is displayed by this script:
And with all this information it can easily find passwords for compromised emails if the dump is accessible and it contains the password
Also Read – Iris : WinDbg Extension To Display Windows Process Mitigations
Ubuntu / Kali Linux / Nethunter / Termux
git clone https://github.com/thewhiteh4t/pwnedOrNot.git
cd pwnedOrNot
pip3 install requests
BlackArch Linux
pacman -S pwnedornot
cd pwnedOrNot
git pull
Usage
python3 pwnedornot.py -h
Usage: pwnedornot.py [-h] [-e EMAIL] [-f FILE] [-d DOMAIN] [-n] [-l]
[-c CHECK]
Optional arguments:
-h, –help show this help message and exit
-e EMAIL, –email EMAIL Email Address You Want to Test
-f FILE, –file FILE Load a File with Multiple Email Addresses
-d DOMAIN, –domain DOMAIN Filter Results by Domain Name
-n, –nodumps Only Check Breach Info and Skip Password Dumps
-l, –list Get List of all pwned Domains
-c CHECK, –check CHECK Check if your Domain is pwned
==> Examples
==> Check Single Email
python3 pwnedornot.py -e
==> OR
python3 pwnedornot.py –email
==> Check Multiple Emails from File
python3 pwnedornot.py -f
==> OR
python3 pwnedornot.py –file
==> Filter Result for a Domain Name [Ex : adobe.com]
python3 pwnedornot.py -e -d
==> OR
python3 pwnedornot.py -f –domain
==> Get only Breach Info, Skip Password Dumps
python3 pwnedornot.py -e -n
==> OR
python3 pwnedornot.py -f –nodumps
==> Get List of all Breached Domains
python3 pwnedornot.py -l
==> OR
python3 pwnedornot.py –list
==> Check if a Domain is Pwned
python3 pwnedornot.py -c
==> OR
python3 pwnedornot.py –check
Video Tutorial
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…