コード例 #1
0
ファイル: hashDecrypt.py プロジェクト: Vivek60/Hjjj
def hashdecrypt():
	hash = input(" Hash: ")
	print("\n"+wait+" Bruteforce '%s'..." % (hash))
	lkd = leaked()
	password = lkd.hash(hash)
	
	if password:
		print("\n"+found+" %s : %s" % (hash, password))
	else:
		print("\n"+warning+" %s : Not match found." % (hash))
コード例 #2
0
def search_email(email):
	lkd = leaked()
	leak = lkd.email(email)

	if leak:
		TABLE_DATA = [
			('Title', 'Domain', 'Date'),
		]

		for lk in leak:
			name = lk['Title']
			domain = lk['Domain']
			date = lk['Date']

			tuples = (name, domain, date)
			TABLE_DATA.append(tuples)

		table = SingleTable(TABLE_DATA, " Leaked Site ")
		print(table.table)


		print("\n"+wait+" Recherche du Mot de passse...")

	table_dump = [
		('Email', 'Password'),
	]

	url = "https://www.google.fr/search?num=100&q=\\intext:\"%s\"\\"
	content = requests.get(url % (email)).text
	urls = re.findall('url\\?q=(.*?)&', content)
	cout = len(urls)
	if cout == 0:
		print(warning+" Aucun résultat.")
	else:
		print(wait+" Scan %s Link..." % (str(cout)))
		x = 1
		countPassword = 0
		for url in urls:
			if not "googleusercontent" in url:
				if not "/settings/ads" in url:
					if not "webcache.googleusercontent.com/" in url:
						if not "/policies/faq" in url:
							try:
								# print("(%s) link scanned. " % (str(x)))
								texte = requests.get(url).text
								# print("Search...")
								combo = re.search(email+r":([a-zA-Z0-9_ & * $ - ! / ; , ? + =  | \. ]+)", texte).group()
								if combo:
									passw = combo.split(":")[1]
									tuples = (email, passw)
									countPassword += 1
									table_dump.append(tuples)
									# print("[+] %s" % (combo))
							except:
								pass
								# print("[?] %s " % (url))
							# x = x + 1
		if countPassword > 0:
			table = SingleTable(table_dump, " Dump ")
			print("\n"+table.table)
		else:
			print(warning+" Aucune donnée pour '%s' " % (email))
コード例 #3
0
def get_pass(out, hash):
    lkd = leaked()
    out.put(lkd.hash(hash))