Search the Community
Showing results for tags 'parser'.
-
Parse seed phrases from MetaMask, Phantom Wallet, Binance Smart Chain. Reads leveldb and iterates through passwords from Passwords.txt if there is a suitable one, writes the seed phrases into a text file mnemonics_Olega.txt Works quickly in 1 thread, why more??? Although I have 3 logs, maybe you will have a slow time. Tested on the logs only redline, perhaps for other stillers does not work. [hide][Hidden Content]]
-
- 5
-
- parserolega
- metamask
- (and 9 more)
-
Domain parser for IPAddress.com Reverse IP Lookup. Writen in Python 3. What is Reverse IP? Reverse IP refers to the process of looking up all the domain names that are hosted on a particular IP address. This can be useful for a variety of reasons, such as identifying all the websites that are hosted on a shared hosting server or finding out which websites are hosted on the same IP address as a particular website. [hide][Hidden Content]]
-
- 2
-
- reverseip_py
- domain
-
(and 5 more)
Tagged with:
-
[Hidden Content] выберите файл обработки Select processing file выберите в какую папку сохранить файп Choose where to save the file напишите как будет называться файл Write the name of the file Конвертировать Convert
-
Fix Version. Easy to use just follow the "FollowMe.txt" under Usage folder. Required: - Wallet logs of metamask under your own results of stealer do not use public logs they are already fucked up. Lastly if you want to donate just PM me i will appreciate any support from anyone. [hide][Hidden Content]]
-
A simple tool to work with Metamask logs Accepts logs only in folders Parser of seed phrases and passwordsBrute force wallets to which passwords from the log did not fit Generation of dictionaries for brute force based on passwords collected from previously checked logs Possibility to choose your own vocabulary for brute force Open config.json In the first line specify the path to the dictionary that you have (already available in the folder with the checker) in the second line specify the number of threads In the third line specify whether to delete empty logs In the fourth, specify the path to the .txt file where the autogenerated dictionary will be written Run metamask-brute.exe Paste the path to the folder where the archives with logs are located or simply drag and drop this folder into the console application (the path will be determined by itself) Press Enter [hide][Hidden Content]]
-
- 3
-
- metamask
- brute-force
-
(and 2 more)
Tagged with:
-
Ultimate Log Parser Almost full-fledged log parser , functionality: - Mass upload (to file/to clipboard): -- Emails -- Passwords -- Usernames -- Discord Tokens - Spot search: -- Search for logs by matching string - request -- Selection in the Url, User, Pass, Cookies, UserInfo format on request - Uploading Logs with a request to a separate folder - Uploading a selection to a separate folder in the Log Id format: LoginData.txt / Cookies.txt / UserInfo.txt -- The software also checks Emails for compliance with the format -- So far, it only supports the Redline format Additional functionality: -- GUI -- Remove Duplicates (Across all fields) [Hidden Content]
-
Avine is an unfinished sql/dorking tool I made in python. A lot of things I never finished because I'm making a csharp version. If anyone is interesting in contributing to avine message me on discord: KillinMachine#2570. There will not be any updates as of now. The vulnerability Does not work. Some engines of the dork parser do work. I just wanted to release this for people to use if they really need something and to learn how it works. Excuse my messy code and some questionable ways I did things. About Avine is a python Dork Parser with a proxy scraper and sql/lfi scanner. Scanners do not work but can be fixed. This program was going to be sold thats why theres a login screen. I did not want to sell the python version due to it being slow. Please do give credit if you use my code anywhere! [hide][Hidden Content]]
-
Tool that tests MANY url bypasses to reach a 40X protected page. If you wonder why this code is nothing but a dirty curl wrapper, here's why: Most of the python requests do url/path/parameter encoding/decoding, and I hate this. If I submit raw chars, I want raw chars to be sent. If I send a weird path, I want it weird, not normalized. This is surprisingly hard to achieve in python without losing all of the lib goodies like parsing, ssl/tls encapsulation and so on. So, be like me, use curl as a backend, it's gonna be just fine. [hide][Hidden Content]]
-
WhatsApp Messenger Version 2.21.9.14 Whapa is a set of graphical forensic tools to analyze WhatsApp from Android and soon iOS devices. All the tools have been written in Python 3.8 and have been tested on Linux, Windows, and macOS systems. Note: Whapa provides 10x more performance and fewer bugs on Linux systems than on windows. Whapa is included as a standard in distributions such as Tsurugi Linux (Digital Forensics) and BlackArch Linux (Penetration Testing). Whapa toolset is divided into five tools: Android Whapa (Whatsapp Parser)(Only working with old database, Working in Progress…) Whacipher (Whatsapp Encryption/Decryption) *** Not support Crypt15 *** Whagodri (Whataspp Google Drive Extractor) Whamerge (Whatsapp Merger) (Only working with old database, Working in Progress…) Whachat (Whatsapp Chat Exporter) Changelog [+] whapa-gui.py v1.58 [+] whacipher.py [-] Fixed Decrypt crypt14 files. [+] whagodri.py [-] Fixed bug connecting with Google. [-] Added No parallel downloads [-] Added support for jpeg files with option “-si” [hide][Hidden Content]]
-
[hide][Hidden Content]]
-
Updated: Jun 2020 WhatsApp Messenger Version 2.19.244 Whapa is a forensic graphical toolset for analyzing WhatsApp in android. All the tools have been written in Python 3.X and have been tested on Linux and Windows 10 systems. It is divided into four tools: Whapa (Whatsapp Parser) Whamerge (Whatsapp Merger) Whagodri (Whataspp Google Drive Extractor) Whacipher (Whatsapp Encryption/Decryption) Changelog [+] whapa-gui.py v1.16 [+] whagodri.py [-] Fixed Google Drive crash when check update [hide][Hidden Content]]
-
WHAPA whapa.py is an android whatsapp database parser which automates the process and presents the data handled by the Sqlite database in a way that is comprehensible to the analyst. If you copy the "wa.db" database into the same directory as the script, the phone number will be displayed along with the name. Please note that this project is an early stage. As such, you could find errors. Use it at your own risk! Whapa is a forensic graphical toolset for analyzing whatsapp in android. All the tools have been written in Python 3.X and have been tested on linux and windows 10 systems. Note: Whapa provides 10x more performance and fewer bugs on linux systems than on windows. Whapa is included as standard in distributions such as Tsurugi Linux (Digital Forensics) and BlackArch Linux (Penetration Testing). Whapa toolset is divided in four tools: Whapa (Whatsapp Parser) Whamerge (Whatsapp Merger) Whagodri (Whataspp Google Drive Extractor) Whacipher (Whatsapp Encryption/Decryption) [HIDE][Hidden Content]]
-
How to make THIS work: Add links to your proxy sheets to the links.txt file (one line, one link. run file ppfl.exe then receive a proxy on a link issued by the software (the link is duplicated in the 'youlink.txt' file, in case you can't copy from the console.) [HIDE][Hidden Content]]
-
Features Parsing from sites with tables Parsing from primitive sites Sorting proxies by countries Deep - Allow to follow links External - Allow to follow third-party domains Retry - Retries crawl/parse if been received bad response Results Saving proxies in ip : port format. NOTE: Double click - select/deselect all countries. [HIDE][Hidden Content]]
-
> [Hidden Content] Mount: Point to any *.pls radio Sid: Dummy control, active/desactive the player button Title: On screen message Website: Hyperlink to any website Test Result: [Hidden Content]
-
Datacol parser The program for the automatic collection of information c websites. This versatile solution for any data available on the Internet. Setting cutting data from any page done in a few mouse clicks. You just need to select an area of the data that you want to save, and he will pick Datacol formula for cutting this block main possibilities to collect a variety of information: The results of search engines, especially the leaders - Yandex and Google. Collect e-mail addresses. Indicators sites with different services, which can then be used for comparison and in-depth analysis. Gathering content from certain sites. Gathering information from the online store, message boards, news sites, and so on. Collection of links from the site of both external and internal. Checking the position of the site for particular queries in search engines. Collection of different media data, graphics, audio clips, videos. Etc ... Saving - the CSV, a TXT; Excel; Mysql (+ MSsql); Export Webasyst; Export Virtuemart; Export Opencart; Export to WordPress; Export to Joomla; Export DLE; Export Instant; Export Ucoz; Export Blogspot; Export Livejournal; Other formats and CMS. Pars and check Proxy. Download: [Hide][Hidden Content]] Password: level23haktools.com