PwnedOrNot : OSINT Tool to Find Passwords for Compromised Email Addresses

PwnedOrNot is a OSINT tool to find passwords for compromised email addresses. pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps.

Features

haveibeenpwned offers a lot of information about the compromised email, some useful information is displayed by this script:

  • Name of Breach
  • Domain Name
  • Date of Breach
  • Fabrication status
  • Verification Status
  • Retirement status
  • Spam Status

And with all this information pwnedOrNot can easily find passwords for compromised emails if the dump is accessible and it contains the password.

Also Read – ARDT : Akamai Reflective DDoS Tool

Tested on

  • Kali Linux 18.2
  • Ubuntu 18.04
  • Kali Nethunter
  • Termux

Installation

Ubuntu / Kali Linux / Nethunter / Termux

chmod 777 install.sh
./install.sh

Usage

python3 pwnedornot.py -h

usage: pwnedornot.py [-h] [-e EMAIL] [-f FILE] [-d DOMAIN] [-n] [-l]
[-c CHECK]

optional arguments:
-h, –help show this help message and exit
-e EMAIL, –email EMAIL Email Address You Want to Test
-f FILE, –file FILE Load a File with Multiple Email Addresses
-d DOMAIN, –domain DOMAIN Filter Results by Domain Name
-n, –nodumps Only Check Breach Info and Skip Password Dumps
-l, –list Get List of all pwned Domains
-c CHECK, –check CHECK Check if your Domain is pwned

Examples

Check Single Email
python3 pwnedornot.py -e
OR
python3 pwnedornot.py –email

Check Multiple Emails from File
python3 pwnedornot.py -f
OR
python3 pwnedornot.py –file

Filter Result for a Domain Name [Ex : adobe.com]
python3 pwnedornot.py -e -d
OR
python3 pwnedornot.py -f –domain

Get only Breach Info, Skip Password Dumps
python3 pwnedornot.py -e -n
OR
python3 pwnedornot.py -f –nodumps

Get List of all Breached Domains
python3 pwnedornot.py -l
OR
python3 pwnedornot.py –list

Check if a Domain is Pwned
python3 pwnedornot.py -c
OR
python3 pwnedornot.py –chec

Demo

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

10 hours ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago