CLI tool based on the https://haveibeenpwned.com API to search for account or passwords included in data breaches
go get github.com/mvording/pwned
If Go environment is default, navigate to ~/go/src/github.com/mvording/pwned and:
go install pwned.go
pwned
specifying either account or password parameter
when specifying the -account
flag (usually email address) it will return the breaches that included the given account
when specifying the -password
flag, it will return the number of times the password was found online in data breaches
You can specify a set of accounts or passwords by specifying the -mode
flag.
-mode=breach
breach search
-mode=password
password count search
To specify a payload you can either redirect/pipe, or explicitly provide a filename with -file="path/to/file.txt"
By default the output is in text, you can specify json format for either mode with -format=json
. For breach requests this will output the full set of breach properties.
./pwned [email protected]
[email protected]=11 // Adobe Apollo Disqus Evony LinkedIn MySpace Neopets Tianya TrikSpamBotnet VerificationsIO Youku
./pwned -password=passw0rd
passw0rd=216221
./pwned -mode=password -file="./test.pass"
passw0rd=216221
password=3645804
./pwned -mode=breach -file="./test.breach"
[email protected]=11 // Adobe Apollo Disqus Evony LinkedIn MySpace Neopets Tianya TrikSpamBotnet VerificationsIO Youku
[email protected]=26 // Apollo CashCrate Dailymotion Dubsmash EverybodyEdits Evony FlashFlashRevolution HauteLook HeroesOfNewerth Houzz iDressup iMesh Lastfm Leet Lifeboat MyFitnessPal MyHeritage MySpace NextGenUpdate OnlinerSpambot RiverCityMedia VerificationsIO Youku Pastebin(g35Jndue) Pastebin(E4qKaR2B) Pastebin(TNpbvQpR)
./pwned -mode=breach < test.breach
same as above
cat test.breach | ./pwned -mode=breach
same as above