Quantcast
Channel: Simple Password – LeakedIn
Viewing all articles
Browse latest Browse all 2663

Potential leak of data: Simple Password

$
0
0
Detected 1 occurrence(s) of ‘\s*pass[word]+\s*[:=]\s*[“‘][a-z0-9\-_\!\$]+[“‘]': ib.spiders import CrawlSpider, Rule class ImageSpider(BaseSpider): counter=0; name = "images" login_url="https://poshmark.com/login" start_urls=['https://poshmark.com/login.php'] login_user='Oliver1234' login_password='somepassword' f=open('poshmark.txt','wb') if not os.path.exists('./Image'): os.mkdir('./Image') def parse(self,response): token = response.xpath("//form[@class='pmform no-label']/div/input[@name='authenticity_token']/@value") Source: http://pastebin.com/raw.php?i=7QkgR9g5

Viewing all articles
Browse latest Browse all 2663

Trending Articles