Beginner Guide
This guide is basically explaining how to use each of our modules to start from zero and reach the final goal: a combo.
Last updated
This guide is basically explaining how to use each of our modules to start from zero and reach the final goal: a combo.
Last updated
The goal: First you need to identify your goal, do you plan to get lines around the Gaming theme, Streaming space or something else. Once you've got that in your mind let's get base keywords.
The base keywords: Now it's time to write a bunch of HQ keywords by yourself that are matching your goal, you can use ChatGPT to help you or just follow the good old days by typing on Amazon, Google, YouTube and grab some keywords.
Using the Keyword Scraper: When you've got about 50-100 keywords it's time to grab a LOT of keywords using our Built-in Keyword Scraper, once you've got them move to the next part, the Page Types.
Start a new task and select the module "Scraper/Parser" choose the threads amount (50-100 for low specs machines) and the timeout. Then load your lists Dorks and Proxies (optional).
Once the task has been created you can move to the settings and choose the search engines of your choice.
Then hit start and wait till you see the results.
Now that you've scraped a bunch of links it's time to find vulnerabilities.
Go back to "Tasks" or press "New task" top right and choose "Vulnerability scanner", select your settings and load your lists (Links & Proxies).
Once the task has been created move to the settings and choose the vulnerability you're looking for, the common one will be SQL. If you want to select "Full Scan" know that it'll slow down the things up but you might get results you wouldn't get without it.
When the task has finished you can save the results and move to the Dumper.
Great you've got a bunch of links that are vulnerable, now we'll exploit them and see how it goes.
Once you're on the "Dumper" page move to the settings, there is a LOT of settings I know but all of them are useful in some ways. If you want to learn more about all those settings move to Dumper settings if not then just leave them like this and go back to the dumper tab.
Now select your list (make sure to upload it first), your proxies and the machine you want to run the task then hit the start button and wait till it's done.
When the task has finished you can scroll down you'll see all vulnerable links (if you've got any), then hit the [...] button and from there you can either dump it right away (make sure to check on the settings for "Auto-dump preset" and set it up accordingly to what you're looking for, should be Email & Password as default value), or you can explore the database and manually go through it to find what you want, learn more about the DB Explorer on the next tab.
I'm a table (eg. users)
I'm a row (eg. johndoe@gmail.com)
I'm a row (eg. ilovejanedoe)
That's the last step, you've got your combo but it's hashed, well lucky you we've built a dehasher that's working pretty smoothly.
Move to "Dehasher" and load your combo, make sure to upload it first, then select the hash pattern (Item:Hash or Hash:Item), for example this line is the Item:Hash pattern.
(eg. email@gmail.com:781e5e245d69b566979b86e28d23f2c7)
You can now hit start and wait till it's finished, then save your results and that's it, you've got your combo.
Click it then click "Open" next to "Dork Generator"