“Emagnet” is a very powerful tool for it’s purpose wich is to capture email addresses and passwords from leaked databases uploaded on pastebin. It’s almost impossible to find leaked passwords when they are out of list on pastebin.com. Either they have been deleted by pastebin’s techs or the uploads is just one in the crowd. To be honest it’s easier to find a needle in a haystack then find outdated uploads on pastebin with the data we want to collect.
Description
Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute forcing spotify accounts,ssh setups and gmail accounts.
Current Version | Released | News | Tested On |
---|---|---|---|
3.4 | -:- | Full support on android devices, no root required | Linux |
Known Issues That Will Be Fixed In Next Push!
- SSH Bruterforcer isn’t completely working anymore
- Requirements packages for android devices when using termux app isnt working with brute force tools + screen
- Sending wrong data into emagnet.log for wich files that contains correct data
TIPS:
Bruteforce on your own risk.
For people that like things sorted. If you have some some archive with leaked databases stored (or small) on your harddrive but you are to lazy to figure out how to try if they work on spotify or gmail for example, then just create a a random text file in “$HOME/.config/emagnet/tmp/some-random-file” – Add all logins as: mail:password one per line – Now just run emagnet as usual and you will bruteforce all accounts you added to the file and all cracked accounts will be stored in log dirs! Once done, you will have a good list for accounts that actually works for real or at least you know wich accounts you can put at top of your text file that you know is legit.
Don’t forget to use vpn, tor or just edit curl command if you want to use a socks5 proxy / ssh tunnel: For a socks5 proxy use: curl –socks5-hostname localhost:port …… and for tor use curl –socks5 127.0.0.1:9150 ……
Demo – How it works
Left side is how you see it – Right side is what actually happening in the background
Installations
Linux/MacOSX
git clone https://github.com/wuseman/emagnet cd emagnet chmod +x emagnet* . ./emagnet --emagnet
Android via Termux
See video here
- Download termux from play store here
Once installed, copy and paste below commands:
echo -e '
pkg update
pkg upgrade -y
pkg install wget curl git -y
git clone https://github.com/wuseman/emagnet
cd emagnet
bash emagnet --emagnet' > emagnet-termux.sh
bash emagnet-termux.sh
Get Started On Windows 10
Please visit my installation wiki for more info (includes a video)
Wiki Sections:
- About – How everything started.
- Previews – Previews can be found here.
- Faq – How to grab your visa card if it has been leaked. Also get answers why we not using TOR.
- Configurations-&-Installation – Get started with spotify brute forcing – How emagnet will work with your openvpn files.
- Regex – Tips For Search – How To Find your facebook credenticals, if it has been leaked._
System requirements
- Bash – Find more info about bash here
- Wget – Find more info about wget here
- Curl – Find more info about curl here
BBC NEWS: “Pastebin: Running the site where hackers publicise their attacks”
- Emagnet is your best friend for get the leaks
Changelog
Authors:
- wuseman <wuseman@nr1.nu>
License
This project is licensed under the GNU General Public License v3.0 – see the LICENSE.md file for details
Contact
If you have problems, questions, ideas or suggestions please contact me on *wuseman@nr1.nu – For faster contact visit freenode irc network or the webchat and type ‘/msg wuseman hi!’ in the input bar and I will reply you ASAP I will see the message.
Enter Freenodes network via your own client ‘chat.freenode.com:+6697 or use their new web client here
Notice
Attacking different kinds of accounts via emagnet that you have not been granted or allowed to attack is strictly prohibited and it breaks the law. The punishment is hard and you can even get into prison in some countries just for trying to attack for intrusion. With this said, it’s important that all users is aware of this and when you have cloned or downloaded it’s fully up to every user to take responsibility over their own actions. wuseman cannot be held responsible for the actions of any user, all users using Emagnet on their own responsibility.
Developer: “All my previews where a brute force attack has been done is under controlling forms with 100% fully permissions by the owners. If you have any questions about this then you are welcome to contact me or the owner.”
Haters Gonna Hate
If you are one of these who dislikes EMAGNET and believe the program has been developed for a reason that would break the law then I am not interested in taking part of your opinions, keep them for yourself! Emagnet does NOT leak any data at all either to the developer(s) or anyone else. No statistics at all to track any user so if you want to contact me for ask who it might was who downloaded emagnet a specific date is completely useless since i really have no idea, and to be honest I don’t care.
Feel free to read the history about emagnet here and how everything started about this project.
Development of emagnet is active and is updated frequently, please use the latest version if you report issues/bugs.
Greetings:
m1st that deliver legit leaks for us daily.
And to all ppl that is trying to sell public leaks and steal the real hackers job, f*ck you! This is one reason why I started this project, I hope this project will get widely spreaded so you will earn 0.00$ on your re-edited malware shit!
Cheers!
1 Comment