pwndb pwndb.py is a python command-line tool for searching leaked credentials using the Onion service with the same name. In this post I’ll describe all the possible options.

Disclaimer

[!] Legal disclaimer: Usage of pwndb.py for attacking targets without
prior mutual consent is illegal. It is the end user's responsibility
to obey all applicable local, state and federal laws. Developers assume
no liability and are not responsible for any misuse or damage caused.

Using a single email:

$ python pwndb.py --target testing@email.com

single-email

Using a domain name:

$ python pwndb.py --target @testing.com

domain-name

Using a file:

Example file:

juanpapafrancisco@gmail.com, romeoyjulietasantos@hotmail.com, dddd@email.com.do
jhonpope@vatican.com
friend@email.com, John Smith <john.smith@email.com>, Jane Smith <jane.smith@uconn.edu>

$ python pwndb.py --list targets_example.txt

file

Using %:

$ python pwndb.py --target testing.%

wildcard