• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

PwnBin – Python Pastebin Search Tool

May 6, 2017

Views: 32,340

PwnBin is a webcrawler or Pastebin search tool which searches public pastebins for specified keywords. All pastes are then returned after sending completion signal CTRL+C.

PwnBin - Python Pastebin Search Tool

Apart from being a great tool for developers, Pastebins are often used by hackers to leak stolen credentials or d0x people. This tool can help you search pastebins for your API keys, SSH keys, tokens and anything else sensitive to check for leaks.

What is a Pastebin?

A pastebin is a type of web application where users can store plain text. They are most commonly used to share short source code snippets for code review via Internet Relay Chat. The first pastebin was located at pastebin.com. Other sites with the same functionality have appeared, and several open-source pastebin scripts are available. Many pastebins allow commenting where readers can post feedback directly on the page. GitHub Gists are a type of pastebin with version control.

Since pastebins are relatively simple to implement, writing a pastebin web-application is regarded as a good exercise for programmers. Representative pastebins now exist for many programming languages, including Lisp, PHP, Perl and Python.

There are other tools that can help with this and similar tasks like – Scumblr by Netflix – Automatically Scan For Leaks.

Pwbin – Pastebin Search Tool Features

  • Currently only supports Pastebin.com
  • Searches by default for:
    • SSH Credentials
    • Passwords
    • API Keys
    • Tokens

Usage for PwnBin Pastebin Search

Basic command:

1
python pwnbin.py -k ,"example substring",..... -o

Both the keyword and outputfile arguments are optional and default to

1
2
-k ssh,pass,key,token
-o log.txt

Optional commands:

1
2
3
4
-a, Append to file instead of overwriting file.
-t <time>, Run for time in seconds.
-n , Run for number of pastes.
-m , Run for number of matches.</time>

You can download PwnBin for Pastebin search here:

pwnbin-master.zip

Or read more here.

Share232
Tweet7
Share76
Buffer32
WhatsApp
Email
347 Shares

Filed Under: Hacking Tools Tagged With: Privacy, Python



Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

AgentSmith HIDS - Host Based Intrusion Detection

AgentSmith HIDS – Host Based Intrusion Detection

padre - Padding Oracle Attack Tool

padre – Padding Oracle Attack Exploiter Tool

Privacy Implications of Web 3.0 and Darknets

Privacy Implications of Web 3.0 and Darknets

DataSurgeon - Extract Sensitive Information (PII) From Logs

DataSurgeon – Extract Sensitive Information (PII) From Logs

Pwnagotchi - Maximize Crackable WPA Material For Bettercap

Pwnagotchi – Maximize Crackable WPA Key Material For Bettercap

HardCIDR - Network CIDR and Range Discovery Tool

HardCIDR – Network CIDR and Range Discovery Tool

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (225)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (430)
  • Forensics (64)
  • Hacker Culture (8)
  • Hacking News (228)
  • Hacking Tools (681)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (72)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (218)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,181,681)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,172,348)
  • Top 15 Security Utilities & Download Hacking Tools (2,095,350)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,198,679)
  • Password List Download Best Word List – Most Common Passwords (931,825)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (774,456)
  • Hack Tools/Exploits (672,588)
  • Wep0ff – Wireless WEP Key Cracker Tool (528,848)

Search

Recent Posts

  • AgentSmith HIDS – Host Based Intrusion Detection August 31, 2023
  • padre – Padding Oracle Attack Exploiter Tool May 28, 2023
  • Privacy Implications of Web 3.0 and Darknets March 31, 2023
  • DataSurgeon – Extract Sensitive Information (PII) From Logs March 21, 2023
  • Pwnagotchi – Maximize Crackable WPA Key Material For Bettercap February 12, 2023
  • HardCIDR – Network CIDR and Range Discovery Tool December 29, 2022

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2023 Darknet All Rights Reserved · Privacy Policy