{"id":657,"date":"2022-09-03T10:24:08","date_gmt":"2022-09-03T10:24:08","guid":{"rendered":"https:\/\/cybersecuritynest.com\/?p=657"},"modified":"2022-09-03T10:24:08","modified_gmt":"2022-09-03T10:24:08","slug":"emagnet-find-leaked-databases-with-97-1-accuracy-to-grab-mail-password","status":"publish","type":"post","link":"https:\/\/cybersecuritynest.com\/?p=657","title":{"rendered":"Emagnet: Find leaked databases with 97.1% accuracy to grab mail + password"},"content":{"rendered":"<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D657\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=657&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47--><blockquote class=\"wp-embedded-content\" data-secret=\"IqS0VW9oWN\"><p><a href=\"https:\/\/cybersecuritynest.com\/?page_id=535\">Disclaimer<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Disclaimer&#8221; &#8212; Cyber Security Nest\" src=\"https:\/\/cybersecuritynest.com\/?page_id=535&#038;embed=true#?secret=cZHlBJUCYL#?secret=IqS0VW9oWN\" data-secret=\"IqS0VW9oWN\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Emagent\u00a0is a very powerful tool with the main purpose of capturing email addresses and passwords from leaked databases stored in\u00a0pastebin. This tool allows the user to find email and password combinations for different websites such as Spotify, Instagram, etc. After finding the combinations, the tool will then\u00a0brute force\u00a0the different combinations on their respective websites to return working combinations to the user.\u00a0Emagnet is the leading leaked database crawler available online.<\/p>\n<div class=\"alert alert-danger\"><strong>Important<\/strong>: \u201c<em>Attacking different kinds of accounts via emagnet that you have not been granted or allowed to attack is strictly prohibited and it breaks the law. The punishment is hard and you can even get into prison in some countries just for trying to attack for intrusion.<\/em>\u201d [\u00a0<a href=\"https:\/\/github.com\/wuseman\/EMAGNET\" target=\"_blank\" rel=\"noreferrer nofollow noopener\" aria-label=\"undefined (opens in a new tab)\">Emagnet Github<\/a>\u00a0]<\/div>\n<div class=\"wp-block-image img-fluid text-center\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/repository-images.githubusercontent.com\/165741206\/f9087e00-397d-11ea-9cab-1aea419f9448\" alt=\"Emagnet Logo Bnner\" width=\"500\" \/><\/figure>\n<\/div>\n<h2>Emagnet: Leaked Database Crawler<\/h2>\n<p>The user can use this tool in\u00a0many different ways. For example, you can use Emagnet to send a mail list and then send emails in one go to\u00a0all of\u00a0the recipients on the list. It can also be run in combination with other custom tools which could be developed for specific purposes. The user can search for all well-known websites such as Facebook, Instagram and Spotify. Emagnet is capable of capturing leaked emails and their passwords. A useful feature of this tool is that it runs on all major operating systems.<\/p>\n<h3 class=\"accent-green\">Features:<\/h3>\n<ul>\n<li>Go through leaked databases uploaded on\u00a0pastebin<\/li>\n<li>Quick and easy to use with more successful attempts for attacks<\/li>\n<li>Find working email and password combinations for major websites such as Facebook, Instagram and Spotify.<\/li>\n<li>Bruteforce ssh targets, Microsoft Remote Desktop, flexible to add your own tools<\/li>\n<li>Cross-platform, runs on all major operating systems such as Linux, Windows and Mac OSX.<\/li>\n<\/ul>\n<h3 class=\"accent-green\">Supported Platforms:<\/h3>\n<ul>\n<li>Linux<\/li>\n<li>Windows<\/li>\n<li>Mac\u00a0OSX<\/li>\n<li>Android\u00a0(Termux, no root required)<\/li>\n<\/ul>\n<h3 class=\"accent-green\">Requirements:<\/h3>\n<ul>\n<li><code>bash<\/code>,\u00a0<code>wget<\/code>,\u00a0<code>curl<\/code>,\u00a0<code>gawk<\/code>,\u00a0<code>gsed<\/code><\/li>\n<\/ul>\n<h2>Install<\/h2>\n<h3 class=\"accent-purple\">Windows<\/h3>\n<ul>\n<li>Install Ubuntu or any other distro from Microsoft Store<\/li>\n<li>When installation has been done, hit \u2018start\u2019<\/li>\n<li>Now type\u00a0<code>sudo\u00a0-s<\/code>\u00a0and enter your password<\/li>\n<li>Now update repo and install git, just copy and paste the below lines<\/li>\n<\/ul>\n<pre class=\"wp-block-preformatted\">$ apt update\r\n$ apt install git -y\r\n$ git clone https:\/\/github.com\/wuseman\/emagnet \r\n$ cd emagnet\r\n$ chmod +x .\/emagnet\r\n$ .\/emagnet --emagnet<\/pre>\n<h3 class=\"accent-purple\">Linux<\/h3>\n<p>Run the following code in the shell:<\/p>\n<pre class=\"wp-block-preformatted\">$ git clone https:\/\/github.com\/wuseman\/EMAGNET\r\n$ cd EMAGNET\r\n$ bash emagnet \u2013emagnet<\/pre>\n<h3 class=\"accent-purple\">Mac OSX<\/h3>\n<p>Run the following code in the shell:<\/p>\n<pre class=\"wp-block-preformatted\">$ git clone https:\/\/github.com\/wuseman\/EMAGNET\r\n$ cd EMAGNET\r\n$ bash emagnet \u2013emagnet<\/pre>\n<h3 class=\"accent-purple\">Android (Termux)<\/h3>\n<p>Run the following code:<\/p>\n<pre class=\"wp-block-preformatted\">$ echo -e ' \r\n$ pkg update \r\n$ pkg upgrade -y \r\n$ pkg install wget curl git -y \r\n$ git clone https:\/\/github.com\/wuseman\/emagnet \r\n$ cd emagnet \r\n$ bash emagnet --emagnet' &gt; emagnet-termux.sh \r\n$ bash emagnet-termux.sh<\/pre>\n<h2>Emagnet Usage<\/h2>\n<p>Use\u00a0<code>-h\u00a0<\/code>to list available options:<\/p>\n<pre class=\"wp-block-preformatted\">$ .\/emagnet -h\r\n\r\n       _                      _______                      _\r\n    _dMMMb._              .adOOOOOOOOOba.              _,dMMMb_\r\n   dP'  ~YMMb            dOOOOOOOOOOOOOOOb            aMMP~  `Yb\r\n   V      ~\"Mb          dOOOOOOOOOOOOOOOOOb          dM\"~      V\r\n            `Mb.       dOOOOOOOOOOOOOOOOOOOb       ,dM'\r\n             `YMb._   |OOOOOOOOOOOOOOOOOOOOO|   _,dMP'\r\n        __     `YMMM| OP'~\"YOOOOOOOOOOOP\"~`YO |MMMP'     __\r\n      ,dMMMb.     ~~' OO     `YOOOOOP'     OO `~~     ,dMMMb.\r\n   _,dP~  `YMba_      OOb      `OOO'      dOO      _aMMP'  ~Yb._\r\n               `YMMMM\\`OOOo     OOO     oOOO'\/MMMMP'\r\n       ,aa.     `~YMMb `OOOb._,dOOOb._,dOOO'dMMP~'       ,aa.\r\n     ,dMYYMba._         `OOOOOOOOOOOOOOOOO'          _,adMYYMb.\r\n    ,MP'   `YMMba._      OOOOOOOOOOOOOOOOO       _,adMMP'   `YM.\r\n    MP'        ~YMMMba._ YOOOOPVVVVVYOOOOP  _,adMMMMP~       `YM\r\n    YMb           ~YMMMM\\`OOOOI`````IOOOOO'\/MMMMP~           dMP\r\n     `Mb.           `YMMMb`OOOI,,,,,IOOOO'dMMMP'           ,dM'\r\n       `'                  `OObNNNNNdOO'                   `'\r\n                             `~OOOOO~'\r\n\r\nUsage: .\/.\/emagnet [--author] [--emagnet] [--option].....\r\n\r\n  -a, --author      Show author information\r\n  -b, --backup      Create a compressed archive\r\n                    - Aavailable options: all\/archive\/incoming\r\n  -B, --blocked     Check if your current IP has been blocked\r\n  -l, --license     Show license information\r\n  -h, --help        Display this very helpful text\r\n  -n, --notify      Set notifications on or off\r\n  -t, --time        Set refresh time in seconds\r\n  -v, --vpn         Toggle VPN on or off (Linux Only)\r\n                    - Available options: true\/false\r\n  -V, --version     Displays version information\r\n  -i, --ip          Print you current WAN IPv4\/IPv6\r\n  -e, --emagnet     Download latest uploaded files on patebin\r\n                    and store email addresses and passwords\r\n                    in sorted day directories.\r\n  -g, --bruteforce  Same as above '-e' with brute-force mode on\r\n                    - Available options: gmail\/ssh\/spotify\/instagram\/rdp<\/pre>\n<p>&nbsp;<\/p>\n<h3 class=\"accent-purple\">Example (Brute Force Spotify Accounts on Ubuntu)<\/h3>\n<p>Run the following commands:<\/p>\n<pre class=\"wp-block-preformatted\">$ wget -q -O - https:\/\/apt.mopidy.com\/mopidy.gpg | sudo apt-key add - \r\n$ wget -q -O \/etc\/apt\/sources.list.d\/mopidy.list https:\/\/apt.mopidy.com\/stretch.list \r\n$ sudo apt-get update \r\n$ sudo apt-get install libspotify12 libspotify-dev libportaudio<\/pre>\n<p>Now you are ready to brute force\u00a0spotify\u00a0accounts:<\/p>\n<pre class=\"wp-block-preformatted\">$ bash emagnet --bruteforce spotify \r\n\r\n<\/pre>\n<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D657\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=657&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47-->","protected":false},"excerpt":{"rendered":"<p>Disclaimer Emagent\u00a0is a very powerful tool with the main purpose of capturing email addresses and passwords from leaked databases stored in\u00a0pastebin. This tool allows the user to find email and password combinations for different websites such as Spotify, Instagram, etc. After finding the combinations, the tool will then\u00a0brute force\u00a0the different combinations on their respective websites [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":656,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[8],"tags":[162],"class_list":["post-657","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ethical-hacking","tag-twitter"],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/657"}],"collection":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=657"}],"version-history":[{"count":2,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/657\/revisions"}],"predecessor-version":[{"id":659,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/657\/revisions\/659"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/media\/656"}],"wp:attachment":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=657"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=657"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=657"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}