An Open Source Script I Wrote To Find Your Company's Deepest Darkest Secrets

A script I wrote to query the dehashed API.

Published: June 20, 2021

Reading Time: 1 minute

What is this?

This is a script that can be used in conjunction with dehashed.com. Dehashed allows anyone who has an API key to query their API for credentials that may exist within a breach database. This script simply uses the dehashed API and sorts the information returned. Currently the script does the following

  • Filters the results in the format of
    • Raw dehashed data formatted with into json with JQ
      "id": "8912739811",
      "email": "example@testdomain.com",
      "ip_address": "0.0.0.0",
      "username": "exampleusername",
      "password": "thisistheplaintextpassword123",
      "hashed_password": "16652e4c27058396b37c026d1bd419a830b20e6a",
      "name": "John Smith",
      "vin": "5YJSA1DG9DFP14705",
      "address": "123 main street",
      "phone": "123-123-1234",
      "database_name": "MyFitnessPal"
    
  • email:password
    • example@testdomain.com:Pa$$word123
  • email:hashedpassword
    • example@testdomain.com:8a5d97b76a1ca8965518b0f94787cdd0

How do I use it?

To use the script, you need a dehashed account and API Key. Next, install JQ

Debian

sudo apt-get install JQ

Then all you need to do is clone this repository and use the following command to query dehashed.

./dehashQuery.sh -l dehashedaccount -k <APIKEY> -s example.com 

This will search the dehashed database for any accounts associated with example.com

Contact me

Twitter: @grahamhelton3

LinkedIn: Graham Helton

Discord Server: https://discord.gg/byCmSHgdZR