Contents

Cr3dov3r Credential Reuse Attack

  

Cr3dOv3r This tool checks your credentials on different websites and looks for if your email is in some data leak.


 

Your best friend in credential reuse attacks.

You give Cr3dOv3r an email then it does two simple useful jobs with it:

  • Search forreuse attack public leaks for the email and returns the result with the most useful details about the leak
  • Now you give it a password or a leaked password then it tries these credentials against some well-known websites (ex: Facebook, Twitter, Google…), tells if the login was successful and if there’s captcha somewhere blocking our way!

 

Some of the scenarios Cr3dOv3r can be used in it

  • Check if the targeted email is in any leaks and then use the leaked password to check it against the websites.
  • Check if the target credentials you found are reused on other websites/services.
  • Checking if the old password you got from the target/leaks is still used on any website.

 

Usage

1
Cr3d0v3r.py -h
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
usage: Cr3d0v3r.py [-h] [-p] [-np] [-q] email

positional arguments:
  email       Email/username to check

optional arguments:
  -h, --help  show this help message and exit
  -p          Don't check for leaks or plain text passwords.
  -np         Don't check for plain text passwords.
  -q          Quiet mode (no banner).

 

Video Cr3dOv3r

Cr3dOv3r Credential reuse attack

 


Become a member on Odysee.com
Earning on Odysee for watching videos ♥️
Here an invitation link, so that we both benefit.
In this way, you also support my work.

https://odysee.com/$/invite/@hackingpassion:9


  Check out Cr3dOv3r here: Github - https://github.com/D4Vinci/Cr3dOv3r


 

Installing

 

+For windows : (After downloading ZIP and upzip it)

1
cd Cr3dOv3r-master
1
python -m pip install -r win_requirements.txt
1
python Cr3d0v3r.py -h

 

+For Linux :

1
git clone https://github.com/D4Vinci/Cr3dOv3r.git
1
cd Cr3dOv3r
1
python3 -m pip install -r requirements.txt
1
python3 Cr3d0v3r.py -h

 

+For docker :

1
git clone https://github.com/D4Vinci/Cr3dOv3r.git
1
docker build -t cr3dov3r Cr3dOv3r/
1
docker run -it cr3dov3r "test@example.com"

WANT TO SUPPORT THE WEBSITE

Dear people, I do a lot of things on the Internet and I do it all for free. If I don’t get enough to support myself, it becomes very difficult to maintain my web presence, which takes a lot of time, and the server costs also have to be paid. Your support is greatly appreciated.

Thanks guys ..!

https://paypal.me/hackingpassion

Use the link above to donate via PayPal.


 

IMPORTANT THINGS TO REMEMBER

✓ This Video and Article is made for educational purposes and pentest only.

* You will not misuse the information to gain unauthorized access.

✓ This information shall only be used to expand knowledge and not for causing malicious or damaging attacks…!


Read also the Disclaimer

All the techniques provided in the tutorials on HackingPassion.com, are meant for educational purposes only.

If you are using any of those techniques for illegal purposes, HackingPassion.com can’t be held responsible for possible lawful consequences.

My goal is to educate people and increase awareness by exposing methods used by real black-hat hackers and show how to secure systems from these hackers.


 

Finally

If you have any questions about this article, any feedback, suggestions if you want to share your thoughts, contact me. Please feel free to do so.


 

 

By Bulls Eye

Jolanda de koff • emaildonate

My name is Jolanda de Koff and on the internet, I'm also known as Bulls Eye. Ethical Hacker, Penetration tester, Researcher, Programmer, Self Learner, and forever n00b. Not necessarily in that order. Like to make my own hacking tools and I sometimes share them with you. "You can create art & beauty with a computer and Hacking is not a hobby but a way of life ...

I ♥ open-source and Linux