{"id":12381,"date":"2021-03-30T21:24:06","date_gmt":"2021-03-30T15:54:06","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=12381"},"modified":"2021-03-30T21:24:06","modified_gmt":"2021-03-30T15:54:06","slug":"godehashed","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/godehashed\/","title":{"rendered":"Godehashed : Tool That Uses The Dehashed.Com API To Search For Compromised Assets"},"content":{"rendered":"\n<p><strong>Godehashed <\/strong>is a golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a CSV for further analysis.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Dehashed API<\/strong><\/p>\n\n\n\n<p>You must supply the tool an api key. See apikey_template.txt for example.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Installation<\/strong><\/p>\n\n\n\n<p>To install the tool in CLI run the following command. Your $GOPATH must already be set.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><code><strong>go get https:\/\/github.com\/an00byss\/godehashed<\/strong><\/code><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>.\/godehashed -s email -i apikey.txt -e SOMEDOMAIN -o leaks.csv<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">Godehashed Usage():<br>-e string<br>Email we are searching for<br>-i string<br>Name of apikey to import.<br>-n string<br>Name we are searching for.<br>-o string<br>Outfile file name, will output in CSV Format.<br>-p int<br>Phone number we are searching for<br>-s string<br>Specify what we are searching for: &#8220;name&#8221;, &#8220;email&#8221;, &#8220;phone&#8221;, &#8220;username&#8221; or &#8220;list&#8221;. Then add corresponding switch.<br>-u string<br>Username we are searching for<br>-l list<br>Search a list of emails.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Search Term<\/th><th>Examples<\/th><\/tr><\/thead><tbody><tr><td>Email<\/td><td><code>godehashed -s email -i apikey.txt -e SOMEDOMAIN.com -o leaks.csv<\/code><\/td><\/tr><tr><td>List<\/td><td><code>godehashed -s list -e email -i apikey.txt -l list.txt -o leaks.csv<\/code><\/td><\/tr><tr><td>Username<\/td><td><code>godehashed -s username -i apikey.txt -u USERNAME -o leaks.csv<\/code><\/td><\/tr><tr><td>Name<\/td><td><code>godehashed -s name -i apikey.txt -n \"Name\" -o leaks.csv<\/code><\/td><\/tr><tr><td>Phone<\/td><td><code>godehashed -s phone -i apikey.txt -p \"phonenumber\" -o leaks.csv<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Legal Disclaimer<\/strong><\/p>\n\n\n\n<p>Usage of godehashed for attacking targets without prior mutual consent is illegal. It is the end user&#8217;s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused. <\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/an00byss\/godehashed\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Godehashed is a golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a CSV for further analysis. Dehashed API You must supply the tool an api key. See apikey_template.txt for example. Installation To install the tool in CLI run the following command. Your $GOPATH must already [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16730,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png","fifu_image_alt":"Godehashed : Tool That Uses The Dehashed.Com API To Search For Compromised Assets","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[198,804,1366],"class_list":["post-12381","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-api","tag-dehashed-com","tag-godehashed"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Godehashed : Tool That Uses The Dehashed.Com API To Search<\/title>\n<meta name=\"description\" content=\"Godehashed is a golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a CSV for further analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/godehashed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Godehashed : Tool That Uses The Dehashed.Com API To Search\" \/>\n<meta property=\"og:description\" content=\"Godehashed is a golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a CSV for further analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/godehashed\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-30T15:54:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/godehashed\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/godehashed\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Godehashed : Tool That Uses The Dehashed.Com API To Search For Compromised Assets\",\"datePublished\":\"2021-03-30T15:54:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/godehashed\/\"},\"wordCount\":200,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/godehashed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png\",\"keywords\":[\"API\",\"Dehashed.Com\",\"Godehashed\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/godehashed\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/godehashed\/\",\"name\":\"Godehashed : Tool That Uses The Dehashed.Com API To Search\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/godehashed\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/godehashed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png\",\"datePublished\":\"2021-03-30T15:54:06+00:00\",\"description\":\"Godehashed is a golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a CSV for further analysis.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/godehashed\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/godehashed\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Godehashed : Tool That Uses The Dehashed.Com API To Search","description":"Godehashed is a golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a CSV for further analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/godehashed\/","og_locale":"en_US","og_type":"article","og_title":"Godehashed : Tool That Uses The Dehashed.Com API To Search","og_description":"Godehashed is a golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a CSV for further analysis.","og_url":"https:\/\/kalilinuxtutorials.com\/godehashed\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-03-30T15:54:06+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/godehashed\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/godehashed\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Godehashed : Tool That Uses The Dehashed.Com API To Search For Compromised Assets","datePublished":"2021-03-30T15:54:06+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/godehashed\/"},"wordCount":200,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/godehashed\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png","keywords":["API","Dehashed.Com","Godehashed"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/godehashed\/","url":"https:\/\/kalilinuxtutorials.com\/godehashed\/","name":"Godehashed : Tool That Uses The Dehashed.Com API To Search","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/godehashed\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/godehashed\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png","datePublished":"2021-03-30T15:54:06+00:00","description":"Godehashed is a golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled into a CSV for further analysis.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/godehashed\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/godehashed\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-O6_QQ4oacjE\/YF5ZSwDa5BI\/AAAAAAAAIpc\/QtKch9nZWJs3CgetLlKU6A-SklzX0sLpQCLcBGAsYHQ\/s728\/Godehashed.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2122,"url":"https:\/\/kalilinuxtutorials.com\/shodanwave-exploring-information-cameras\/","url_meta":{"origin":12381,"position":0},"title":"Shodanwave &#8211; Tool For Exploring &#038; Obtaining Information From Cameras","author":"R K","date":"August 2, 2018","format":false,"excerpt":"Shodanwave is a tool for exploring and obtaining information from cameras specifically Netwave IP Camera. The tool uses a search engine called shodan that makes it easy to search for cameras online. What does the tool to? Look, a list! Search Brute force SSID and WPAPSK Password Disclosure E-mail, FTP,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/123.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/123.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/123.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/123.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/123.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/123.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6355,"url":"https:\/\/kalilinuxtutorials.com\/nebulousad-automated-credential-auditing-tool\/","url_meta":{"origin":12381,"position":1},"title":"NebulousAD : Automated Credential Auditing Tool","author":"R K","date":"August 30, 2019","format":false,"excerpt":"NebulousAD automated credential auditing tool. I will be adding a wiki, documentation, etc. soon. Features: Will be adding a redact-by-group feature that will not dump hashes or check against the api for accounts in specific groups (such as domain administrators). Installation Simply download the precompiled release (requires no python interpreter),\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":18746,"url":"https:\/\/kalilinuxtutorials.com\/pyhook\/","url_meta":{"origin":12381,"position":2},"title":"PyHook : An Offensive API Hooking Tool Written In Python Designed To Catch Various Credentials Within The API Call","author":"R K","date":"September 29, 2021","format":false,"excerpt":"PyHook is the python implementation of my\u00a0SharpHook\u00a0project, It uses various API hooks in order to give us the desired credentials. PyHook Uses frida to inject it's dependencies into the target process Supported Processes ProcessAPI CallDescriptionProgressmstscCredUnPackAuthenticationBufferWHooks\u00a0CredUnPackAuthenticationBufferW\u00a0from mstsc and outputs username and passwordDONErunasCreateProcessWithLogonWHooks\u00a0CreateProcessWithLogonW\u00a0from runas and outputs username, password and a domain name.DONEPowerShellCreateProcessWithLogonWHooks\u00a0CreateProcessWithLogonW\u00a0from\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":12053,"url":"https:\/\/kalilinuxtutorials.com\/mosint\/","url_meta":{"origin":12381,"position":3},"title":"MOSINT &#8211; OSINT Tool For Emails","author":"R K","date":"January 8, 2021","format":false,"excerpt":"MOSINT is an OSINT Tool for emails. It helps you gather information about the target email. Features Verification Service { Check if email exist } Check social accounts with Socialscan Check data breaches [need API] Find related emails Find related phone numbers Find related domains Scan Pastebin Dumps Google Search\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"MOSINT \u2013 OSINT Tool For Emails","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-_eJdZHcJT6g\/X_WbqQLQuUI\/AAAAAAAAIRM\/Ho4BhxR3EO8fkskGirtmtDjSijvVIHF7ACLcBGAsYHQ\/s728\/MOSINT%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-_eJdZHcJT6g\/X_WbqQLQuUI\/AAAAAAAAIRM\/Ho4BhxR3EO8fkskGirtmtDjSijvVIHF7ACLcBGAsYHQ\/s728\/MOSINT%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-_eJdZHcJT6g\/X_WbqQLQuUI\/AAAAAAAAIRM\/Ho4BhxR3EO8fkskGirtmtDjSijvVIHF7ACLcBGAsYHQ\/s728\/MOSINT%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-_eJdZHcJT6g\/X_WbqQLQuUI\/AAAAAAAAIRM\/Ho4BhxR3EO8fkskGirtmtDjSijvVIHF7ACLcBGAsYHQ\/s728\/MOSINT%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10254,"url":"https:\/\/kalilinuxtutorials.com\/git-hound\/","url_meta":{"origin":12381,"position":4},"title":"Git-Hound : PinPoints Exposed API Keys On GitHub Using Pattern Matching","author":"R K","date":"April 14, 2020","format":false,"excerpt":"A batch-catching, pattern-matching, patch-attacking secret snatcher. GitHound pinpoints exposed API keys on GitHub using pattern matching, commit history searching, and a unique result scoring system. A batch-catching, pattern-matching, patch-attacking secret snatcher. Features GitHub\/Gist code searching. This enables GitHound to locate sensitive information exposed across all of GitHub, uploaded by any\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7807,"url":"https:\/\/kalilinuxtutorials.com\/automatic-api-attack-tool\/","url_meta":{"origin":12381,"position":5},"title":"Automatic API Attack Tool 2019","author":"R K","date":"December 23, 2019","format":false,"excerpt":"Automatic API Attack Tool is a imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an output. Automatic API Attack tool is able to parse an API specification and create fuzzing attack scenarios based on what is\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=12381"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12381\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16730"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=12381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=12381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=12381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}