Cr3dOv3r This tool checks your credentials on different websites and looks for if your email is in some data leak.
Your best friend in credential reuse attacks.
You give Cr3dOv3r an email then it does two simple useful jobs with it:
- Search forreuse attack public leaks for the email and returns the result with the most useful details about the leak
- Now you give it a password or a leaked password then it tries these credentials against some well-known websites (ex: Facebook, Twitter, Google…), tells if the login was successful and if there’s captcha somewhere blocking our way!
- Check if the targeted email is in any leaks and then use the leaked password to check it against the websites.
- Check if the target credentials you found are reused on other websites/services.
- Checking if the old password you got from the target/leaks is still used on any website.
usage: Cr3d0v3r.py [-h] [-p] [-np] [-q] email positional arguments: email Email/username to check optional arguments: -h, --help show this help message and exit -p Don't check for leaks or plain text passwords. -np Don't check for plain text passwords. -q Quiet mode (no banner).
If you like to join me on lbry.tv
Here you can find more videos:
Become a member on LBRY
Plus earning LBRY for watching videos ♥️
Here an invitation link, so that we both benefit.
In this way, you also support my work.
Obviously you can also follow me on YouTube (But not all videos will be placed there).
Check out Cr3dOv3r here: Github – https://github.com/D4Vinci/Cr3dOv3r
+For windows : (After downloading ZIP and upzip it)
cd Cr3dOv3r-master python -m pip install -r win_requirements.txt python Cr3d0v3r.py -h
+For Linux :
git clone https://github.com/D4Vinci/Cr3dOv3r.git cd Cr3dOv3r python3 -m pip install -r requirements.txt python3 Cr3d0v3r.py -h
+For docker :
git clone https://github.com/D4Vinci/Cr3dOv3r.git docker build -t cr3dov3r Cr3dOv3r/ docker run -it cr3dov3r "email@example.com"
My goal is to educate people and increase awareness by exposing methods used by real black-hat hackers and show how to secure systems from these hackers.
Maybe you have some questions that I can answer in the next video? Let me know.! That will be great 🙂
IMPORTANT THINGS TO REMEMBER
★ This information shall only be used to expand knowledge and not for causing malicious or damaging attacks…!
★ This Video and Article are made for educational purposes and pentest only.
★ You will not misuse the information to gain unauthorized access.
All the techniques provided in the tutorials on the hackingpassion.com, YouTube channel, and on the website hackingpassion.com are meant for educational purposes only.
If you are using any of those techniques for illegal purposes, hackingpassion.com can’t be held responsible for possible lawful consequences.
★ Website – https://hackingpassion.com
★ Facebook – https://www.facebook.com/jolandadekoff
★ JOIN OUR FACEBOOK GROUP – https://www.facebook.com/groups/hack.passion/
★ Facebook page – https://www.facebook.com/ethical.hack.group/
★ Linkedin – https://www.linkedin.com/in/jolandadekoff/
★ Twitter – https://twitter.com/bulls__eye
★ GitHub – https://github.com/BullsEye0
★ Reddit – https://www.reddit.com/user/BullsEye_0
I hope you enjoy – enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.