10-07-25, 08:41 PM
FULL DATA LEAK: https://files.catbox.moe/plvacx.sql
The backstory behind this leak: https://files.catbox.moe/eueafh.sql
The backstory behind this leak: https://files.catbox.moe/eueafh.sql
10-07-25, 08:41 PM
FULL DATA LEAK: https://files.catbox.moe/plvacx.sql
The backstory behind this leak: https://files.catbox.moe/eueafh.sql
10-07-25, 09:34 PM
The second file doesn't look like a backstory narrative
10-07-25, 09:38 PM
(10-07-25, 09:34 PM)Mustard Wrote: The second file doesn't look like a backstory narrative Whoops, here it is: https://snippet.host/jqusoe I genuinely wish I could edit my threads to fix mistakes like this lol, I stayed up until 1AM last night when I posted this on demonforums I just copied it over here not realizing It had the same mistake lol, but on demonforums I can actually edit my threads
10-07-25, 11:44 PM
BUMPBUMPBUMPBUMP
11-07-25, 01:36 AM
BUMPBUMPBUMPBUMP
11-07-25, 01:55 AM
High quality shit you are dope ! F*** the gov
11-07-25, 01:37 PM
hey buddy the link shows error can you add a new one
11-07-25, 10:10 PM
(11-07-25, 01:37 PM)spockhalfhuman Wrote: hey buddy the link shows error can you add a new one If your referring to the "backstory link" I have no idea what's happening lol, this has never happened before with the snippet.host website, but right now whenever I click on it, its redirecting to those "phishy" adds then directs to a random .exe file it wants be to download that file is 99% malware, However, it seems like snippet has just fixed it, as the links are now back to normal, but just in case it happens again, I uploaded it to pastebin instead: https://pastebin.com/35UHWByq
17-07-25, 12:04 PM
This is a data extraction of "bka.bund.de"
It collected all the emails with that host and it pulled the info from all sort of leaked databases. Might be an API call to snusbase since its matching the amount of lines - almost. Its a collection of known leaked info.
18-07-25, 01:11 AM
(17-07-25, 12:04 PM)strategytest Wrote: This is a data extraction of "bka.bund.de" its neither an extraction nor an API call, Its a .sql file which contains many logins to Vmware because they use a lot of virtual machines for operations and safety reasons I can even show you a screenshot of me Logged into there server VIA SSH, I literally had access lol, but even if this was an extraction, if you actually see what data is inside it, its still worth a fortune and there is a lot you can do with it, and certainly better than anything you could ever dream of leaking, I'm just saying Here is the screenshot of me in their system: [/url][url=https://files.catbox.moe/p4v06o.jpg]https://files.catbox.moe/p4v06o.jpg6o.jpg and if you look at the IP address of what I circled, you can see the IP address of the server I'm Logged into, It's the same exact IP address that BOTH bka.de and bund.de is running off of, which is a massive vulnerability, because if I gain access to one government service (which is bka.de in this case, the police) I essentially compromise the entire thing, because bund.de is the entire portal the government uses for basically everything, so this database is all made up of government workers which you can tell from the emails and for more proof, You can ping both bund.de and bka.de and you can see both are running on the exact same server, and you can also use DNSdumpster to prove my point |
« Next Oldest | Next Newest »
|