-
Notifications
You must be signed in to change notification settings - Fork 18
/
Copy pathemailpwnedatdomain
34 lines (29 loc) · 1011 Bytes
/
emailpwnedatdomain
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
// A Maltego Machine which extracts emails for a domain and checks if any account related to that has been pwned (using HaveIBeenPwned: HIBP).
// Special thanks to Troy Hunt for https://haveibeenpwned.com/
// It requires the local transform emailtoHIBP: https://github.com/SudhanshuC/Maltego-Transforms/blob/master/emailtoHIBP.py
machine("sudhanshuchauhan.EmailPwnedatDomain",
displayName:"Email Pwned at Domain",
author:"Sudhanshu Chauhan",
description: "Extracts Emails for the Domain and checks if account related to any one of them has been pwned.\
") {
start {
paths{
path{
run("paterva.v2.DomainToEmailAddress_AtDomain_SE")
run("sudhanshuchauhan.emailtohibp")
}
path{
run("paterva.v2.DomainToEmailAddress_SE")
run("sudhanshuchauhan.emailtohibp")
}
path{
run("paterva.v2.DomainToEmailAddress_Whois")
run("sudhanshuchauhan.emailtohibp")
}
path{
run("paterva.v2.DomainToEmailAddress_PGP")
run("sudhanshuchauhan.emailtohibp")
}
}
}
}