Dumper & DB Explorer

Tip: Always run the Dumper and DB Explorer with stable proxies. They protect your IP and reduce the chance of rate limits.

Run the Dumper

  1. Upload the list of vulnerable URLs collected by the Vulnerability scanner.
  2. Select a reliable proxy list (10–20 ISP/DC proxies work best).
  3. Choose the machine that will process the task.
  4. Review the settings (see Settings Module) and configure presets such as Auto-dump preset before you start.
  5. Launch the task and wait for it to finish.

When the task completes:

  • Scroll through the results to see which targets were exploitable.
  • Use the contextual ... menu on each row to dump immediately or open the DB Explorer.
  • Filter the results list using the dropdown next to Save results to focus on successful dumps.

Explore Databases

The DB Explorer behaves like a spreadsheet browser:

  • Database – Usually, only one database is available and selected by default.
  • Tables – Choose one table at a time to load its structure.
  • Columns – Select the columns you want to examine (for example email and password).
  • Rows – After selecting columns, the Explorer displays the matching rows so you can validate the data before exporting.

Use the Explorer to verify that your presets capture the data you expect. Adjust presets if you see 0/0 rows or missing fields, then rerun the Dumper if necessary.

On this page