Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ XposedOrNot - Tool To Search An Aggregated Repository Of Xposed Passwords Comprising Of ~850 Million Real Time Passwords

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š XposedOrNot - Tool To Search An Aggregated Repository Of Xposed Passwords Comprising Of ~850 Million Real Time Passwords


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


XposedOrNot (XoN) tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage of such compromised passwords is detrimental to individual account security.

What is Xposed Passwords?
The main aim of this project is to give a free platform for the general public to check if their password is exposed and compromised.
This massive password collection is an accumulation of real passwords exposed in various data breaches around the world. Passwords are curated from exposed breaches like Collection #1, Yahoo, etc. Adding to that, passwords are also commonly exposed in "pastes" in pastebin.com. We have taken more than 40,000 such exposures and that is again added to this huge list.
The collated passwords are hashed with a highly secure hashing algorithm SHA-3 ( Keccak-512 ), and stored in a one way hash for verification. No passwords are stored in plain text and the process of checking anonymously is explained in detail in our blog post, 850 million passwords for free explaining the technical and operational controls enforced for enhancing the security posture. Feel free to go through the same.

How to install?
git clone https://github.com/Viralmaniar/XposedOrNot.git
cd XposedOrNot
pip install -r requirements.txt
python XposedorNot.py

How to interpret an output?
The output will consist of JSON output for easy reference. Primary reasons for giving an output in JSON instead of a yes/no is to ensure that this can be further used by people to develop and improve on the huge list of real time exposed passwords aggregated here.
Alright, the first element "anon" is added to all password hashes stored in XoN for enabling privacy conscious users to search as well. Second element "char" is a list of characteristics of the password, which can be further used for understanding the strength of the password to know if this will meet the requirements of applications in need. Many websites have policies on the use of selecting passwords based on number of characters, mixture of alphabets, numbers and special characters.
The following table explains a bit more about the characteristics in simple terms :
Alphabet Description
Digits Count of numbers
Alphabets Count of alphabets
Special chars Count of special chars
Length Length of the password
The last one "count" denotes the number of times, this password was observed in the collected xposed data breaches. For a comprehensive list of all xposed websites, please visit Xposed websites-XoN.
Also, one another point to note is the use of Keccak-512 hashing for searching and storing data in XoN. Traditional hashing algorithms like MD5 and SHA1 are currently deprecated and also considering the enormous number of records exposed, I have gone ahead with Keccak-512 hashes.
Yes, Keccak-512 is 128 characters long and it consumes more storage.
Two sample Keccak-512 hashes given for easy reference: test - 1e2e9fc2002b002d75198b7503210c05a1baac4560916a3c6d93bcce3a50d7f00fd395bf1647b9abb8d1afcc9c76c289b0c9383ba386a956da4b38934417789e pass - adf34f3e63a8e0bd2938f3e09ddc161125a031c3c86d06ec59574a5c723e7fdbe04c2c15d9171e05e90a9c822936185f12b9d7384b2bedb02e75c4c5fe89e4d4 Sample output on not finding the matching password hash:
 {
"Error": "Not found"
}

Collected Passwords timeline - thanks to DevaOnBreaches






Detailed list can be seen here: https://xposedornot.com/xposed

Questions?
Twitter: @ManiarViral
LinkedIn: https://au.linkedin.com/in/viralmaniar

Credit
XposedOrNot is maintained by DevaOnBreaches. Big thanks for creating an API for your service. You can connect with him at https://www.devaonbreaches.com/


...



๐Ÿ“Œ Xposed Framework for Android Nougat Still Under Development


๐Ÿ“ˆ 31.73 Punkte

๐Ÿ“Œ Xposed Framework fรผr Android 7 verรถffentlicht


๐Ÿ“ˆ 31.73 Punkte

๐Ÿ“Œ Reverse-engineering Google Cast to disable device authentication on Android with Xposed


๐Ÿ“ˆ 31.73 Punkte

๐Ÿ“Œ Bad bot traffic increases, comprising almost one quarter of all website traffic


๐Ÿ“ˆ 30.65 Punkte

๐Ÿ“Œ Play ransomware leaks Swiss government data comprising sensitive information


๐Ÿ“ˆ 30.65 Punkte

๐Ÿ“Œ Meet CelebV-Text: A Large-Scale Facial Text-Video Dataset Comprising 70,000 in-the-wild Face Video Clips with Diverse Visual Content


๐Ÿ“ˆ 30.65 Punkte

๐Ÿ“Œ Meet MathPile: A Diverse and High-Quality Math-Centric Corpus Comprising About 9.5 Billion Tokens


๐Ÿ“ˆ 30.65 Punkte

๐Ÿ“Œ I aggregated the best linux software in each category. I would love some feedback and suggestions!


๐Ÿ“ˆ 29.78 Punkte

๐Ÿ“Œ Optus posts 50Gbps aggregated throughput on 5G site


๐Ÿ“ˆ 29.78 Punkte

๐Ÿ“Œ Generating 3D Molecular Conformers via Equivariant Coarse-Graining and Aggregated Attention


๐Ÿ“ˆ 29.78 Punkte

๐Ÿ“Œ Pivot Challenge: Can you analyze this aggregated data?


๐Ÿ“ˆ 29.78 Punkte

๐Ÿ“Œ Real-Time Payments, Real-Time Fraud Risks?


๐Ÿ“ˆ 28.4 Punkte

๐Ÿ“Œ Real-Time Payments, Real-Time Fraud Risks?


๐Ÿ“ˆ 28.4 Punkte

๐Ÿ“Œ IT Science Case Study: Real-time Customer Support Using Real-time Collaboration


๐Ÿ“ˆ 28.4 Punkte

๐Ÿ“Œ Real-time programming with Linux, part 1: What is real-time?


๐Ÿ“ˆ 28.4 Punkte

๐Ÿ“Œ Data Analysis for Live Streaming: What Happens in Real Time Is Analyzed in Real Time?


๐Ÿ“ˆ 28.4 Punkte

๐Ÿ“Œ Seven ways to make real-time technology real for your organization


๐Ÿ“ˆ 22.22 Punkte

๐Ÿ“Œ Python Time Module | Useful Functions | How to Use? | Applications in Real Models | 2 Real World Programs


๐Ÿ“ˆ 22.22 Punkte

๐Ÿ“Œ Apache Kafka Is NOT Real Real-Time Data Streaming!


๐Ÿ“ˆ 22.22 Punkte

๐Ÿ“Œ Troy Hunt: Pwned Passwords in Practice: Real World Examples of Blocking the Worst Passwords


๐Ÿ“ˆ 21.57 Punkte

๐Ÿ“Œ Built-in vector search and limitless scalability for generative AI and real-time workloads.


๐Ÿ“ˆ 20.87 Punkte

๐Ÿ“Œ Google Research Introduces TimesFM: A Single Forecasting Model Pre-Trained on a Large Time-Series Corpus of 100B Real World Time-Points


๐Ÿ“ˆ 20.38 Punkte

๐Ÿ“Œ CVE-2022-34195 | Repository Connector Plugin up to 2.2.0 on Jenkins Maven Repository Artifact name/description cross site scripting


๐Ÿ“ˆ 20.31 Punkte

๐Ÿ“Œ Reset Local Repository Branch to be Just Like Remote Repository HEAD: A Step-by-Step Guide


๐Ÿ“ˆ 20.31 Punkte

๐Ÿ“Œ Portal Search search.php search cross site scripting


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ MSN > Windows Live Search > Live Search > Bing and now the new Bing โ€“ a short history of online search at Microsoft


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ Swirl Search: Open Source Enterprise Search ๐Ÿ” to Securely ๐Ÿ” Search your Data.


๐Ÿ“ˆ 20.01 Punkte

๐Ÿ“Œ Hack the Car in Real Time โ€“ Car Alarm Flaw let Hackers Remotely Hijack 3 Million Vehicles Globally


๐Ÿ“ˆ 19.79 Punkte

๐Ÿ“Œ Memcyco raises $10 million to deliver real-time brandjacking protection


๐Ÿ“ˆ 19.79 Punkte











matomo