An Open Source Script I Wrote To Find Your Company's Deepest Darkest Secrets

A script I wrote to query the dehashed API.

Published: June 20, 2021

Reading Time: 1 minute

What is this?

This is a script that can be used in conjunction with Dehashed allows anyone who has an API key to query their API for credentials that may exist within a breach database. This script simply uses the dehashed API and sorts the information returned. Currently the script does the following

  • Filters the results in the format of
    • Raw dehashed data formatted with into json with JQ
      "id": "8912739811",
      "email": "",
      "ip_address": "",
      "username": "exampleusername",
      "password": "thisistheplaintextpassword123",
      "hashed_password": "16652e4c27058396b37c026d1bd419a830b20e6a",
      "name": "John Smith",
      "vin": "5YJSA1DG9DFP14705",
      "address": "123 main street",
      "phone": "123-123-1234",
      "database_name": "MyFitnessPal"
  • email:password
  • email:hashedpassword

How do I use it?

To use the script, you need a dehashed account and API Key. Next, install JQ


sudo apt-get install JQ

Then all you need to do is clone this repository and use the following command to query dehashed.

./ -l dehashedaccount -k <APIKEY> -s 

This will search the dehashed database for any accounts associated with

Contact me

Twitter: @grahamhelton3

LinkedIn: Graham Helton

Discord Server: