From 653efce0e54925e4f76eaf013a49126d758de4d4 Mon Sep 17 00:00:00 2001 From: Alexandre ZANNI <16578570+noraj@users.noreply.github.com> Date: Thu, 30 Sep 2021 21:40:51 +0200 Subject: [PATCH 1/2] Breachdirectory domain change --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index d0a116b..c865e20 100644 --- a/README.md +++ b/README.md @@ -73,7 +73,7 @@ | [scylla.so](https://scylla.so/) - Service (free) | Cleartext passwords, hashs and salts, usernames, IPs, domain | :construction: | | [Dehashed.com](https://dehashed.com/) - Service | Cleartext passwords, hashs and salts, usernames, IPs, domain | :white_check_mark: :key: | | [IntelX.io](https://intelx.io/signup) - Service (free trial) | Cleartext passwords, hashs and salts, usernames, IPs, domain, Bitcoin Wallets, IBAN | :white_check_mark: :key: | -| :new: [Breachdirectory.tk](https://breachdirectory.tk) - Service (free) | Cleartext passwords, hashs and salts, usernames, domain | :white_check_mark: :key: | +| :new: [Breachdirectory.org](https://breachdirectory.org) - Service (free) | Cleartext passwords, hashs and salts, usernames, domain | :white_check_mark: :key: | *:key: - API key required* From caf182df3223da38a26a2295bd5db0dc7d204f06 Mon Sep 17 00:00:00 2001 From: Alexandre ZANNI <16578570+noraj@users.noreply.github.com> Date: Thu, 30 Sep 2021 21:42:33 +0200 Subject: [PATCH 2/2] Breachdirectory domain change --- h8mail/utils/classes.py | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/h8mail/utils/classes.py b/h8mail/utils/classes.py index 8543d6c..ad59e8b 100644 --- a/h8mail/utils/classes.py +++ b/h8mail/utils/classes.py @@ -828,12 +828,12 @@ def get_dehashed(self, api_email, api_key, user_query): def get_breachdirectory(self, user, passw, user_query): # Todo: implement password source search when email has answer - c.info_news("[" + self.target + "]>[breachdirectory.tk]") + c.info_news("[" + self.target + "]>[breachdirectory.org]") if user_query not in ["email", "username", "password", "domain"]: c.bad_news("Breachdirectory does not support this option") exit(1) mode = "pastes" - url = "https://breachdirectory.tk/api/index?username={user}&password={passw}&func={mode}&term={target}".format(user=user, passw=passw, mode=mode, target=self.target) + url = "https://breachdirectory.org/api/index?username={user}&password={passw}&func={mode}&term={target}".format(user=user, passw=passw, mode=mode, target=self.target) try: req = self.make_request( url, timeout=60 @@ -852,7 +852,7 @@ def get_breachdirectory(self, user, passw, user_query): self.data.append(("BREACHDR_SOURCE", result["source"])) self.pwned += 1 # Follow up with an aggregated leak sources query - url_src = "https://breachdirectory.tk/api/index?username={user}&password={passw}&func={mode}&term={target}".format(user=user, passw=passw, mode="sources", target=self.target) + url_src = "https://breachdirectory.org/api/index?username={user}&password={passw}&func={mode}&term={target}".format(user=user, passw=passw, mode="sources", target=self.target) req = self.make_request( url_src, timeout=60 ) @@ -863,7 +863,7 @@ def get_breachdirectory(self, user, passw, user_query): self.data.append(("BREACHDR_EXTSRC", result)) ## If using the 'auto' mode instead of pastes # c.good_news( - # "Found {num} entries for {target} using breachdirectory.tk".format( + # "Found {num} entries for {target} using breachdirectory.org".format( # num=str(response["found"]), target=self.target # ) # ) @@ -882,4 +882,4 @@ def get_breachdirectory(self, user, passw, user_query): # self.pwned += 1 except Exception as ex: c.bad_news(f"Breachdirectory error with {self.target}") - print(ex) \ No newline at end of file + print(ex)