Dumper & DB Explorer
Last updated
Last updated
The dumper will basically find and exploit the vulnerabilities from the list of URLs you load.
Select your list (make sure to upload it first), your proxies and the machine you want to run the task then hit the start button and wait till it's done.
When the task has finished you can scroll down you'll see all vulnerable links (if you've got any), then hit the [...] button and from there you can either dump it right away (make sure to check on the settings for "Auto-dump preset" and set it up accordingly to what you're looking for, should be Email & Password as default value), or you can explore the database and manually go through it to find what you want, learn more about the DB Explorer on the next tab.
I'm a table (eg. users)
I'm a row (eg. johndoe@gmail.com)
I'm a row (eg. ilovejanedoe)