显示帐户信息是否已被典当的Web服务器
pwnserver的Python项目详细描述
运行一个简单的Web服务器,显示您的帐户信息是否 妥协的。此轮询haveibeenpwned每 12小时后返回所有发现的受损账户。
安装
PIP
pip install pwnserver
发展
git clone https://github.com/walchko/pwnserver cd pwnserver pip install -e .
用法
要运行服务器:
pwnserver --email emails.json --port 9000
您需要一个包含名称和电子邮件的配置文件:
{"bob":["bob.tom@google.com","bob.tom@yahoo.com"],"tom":["tom.jones@google.com","tom.jones@snuggle.org"]}
如果要使用某些类和函数:
frompwnimportHTML,readJsonhtml=HTML()html.p('hi')data=readJson('myfile.json')
原始输出
来自haveibeenpwned.com:
的原始输出示例[{"PwnCount":152445165,"Domain":"adobe.com","IsSensitive":false,"Name":"Adobe","Title":"Adobe","DataClasses":["Email addresses","Password hints","Passwords","Usernames"],"IsRetired":false,"LogoType":"svg","BreachDate":"2013-10-04","IsActive":true,"AddedDate":"2013-12-04T00:00:00Z","IsVerified":true,"Description":"In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, encrypted password and a password hint in plain text. The password cryptography was poorly done and many were quickly resolved back to plain text. The unencrypted hints also disclosed much about the passwords adding further to the risk that hundreds of millions of Adobe customers already faced."},{"PwnCount":68648009,"Domain":"dropbox.com","IsSensitive":false,"Name":"Dropbox","Title":"Dropbox","DataClasses":["Email addresses","Passwords"],"IsRetired":false,"LogoType":"svg","BreachDate":"2012-07-01","IsActive":true,"AddedDate":"2016-08-31T00:19:19Z","IsVerified":true,"Description":"In mid-2012, Dropbox suffered a data breach which exposed the stored credentials of tens of millions of their customers. In August 2016, they forced password resets for customers they believed may be at risk. A large volume of data totalling over 68 million records was subsequently traded online and included email addresses and salted hashes of passwords (half of them SHA1, half of them bcrypt)."}]
更改日志
2016-10-29 | 0.1.1 | published to PyPi |
2016-09-16 | 0.0.1 | init |