How to use PasteMonitor to automatically collect Paste every day

0 23
PasteMonitor tool allows us to perform the following two major tasks (for educat...

How to use PasteMonitor to automatically collect Paste every day

PasteMonitor tool allows us to perform the following two major tasks (for educational purposes only):

1. Download the newly released public Paste every day:

The average number of Paste released daily is 1000-3000, with file type as '.txt'.

2. Automatically send email notifications

We can set up a dictionary file, and when PasteMonitor crawls content that matches the keywords in the dictionary, the tool will send an email notification to the user:

If the target Paste cannot be accessed directly, we can also find the Paste content (the Paste ID in the figure below is 'WJq2YxPg') on our computer or server through the Paste ID:

Tool preparation

Before starting to use PasteMonitor, we need to prepare the following contents:

1. Obtain onePastebin Pro account

2. In the "Account&Whitelist IPEnter your computer/server's IP address in the "

3. Activate the email account and authorize third-party applications to access

4. EnableTwo-factor authentication feature

5.Generate an App passwordReference materials

Next, write the following content into 'pastemonitor.py':

1. Electronic mail credentials (email address and password)

2. Email notification recipient (recipient)

Dictionary file

In the 'wordlist.txt' file provided by the project, we can add the required keywords line by line.

Tool download

Researchers can use the following command to clone the source code of this project locally:

git clone https://github.com/pixelbubble/PasteMonitor.git

Tool dependency installation

pip3 install -r requirements.txt

Tool usage

The use of this tool is also very simple, after configuring the relevant parameter options, simply run the following command directly:

python3 pastemonitor.py

License Agreement

The development and release of this project followMITOpen Source License Agreement.

Project address

PasteMonitor:GitHub Gateway

Reference materials

https://pastebin.com/doc_scraping_api

https://pastebin.com/pro

https://myaccount.google.com/u/2/signinoptions/two-step-verification

https://myaccount.google.com/u/2/apppasswords

https://ljmocic.medium.com/send-an-email-using-python-and-gmail-4ebc980eae9b

你可能想看:

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

APP Illegal Trend: Interpreting the 'Identification Method for Illegal and Unauthorized Collection and Use of Personal Information by APPs'

From 0 to 1, this article is enough to collect SQL injection (sql ten injection types), technical analysis and practical training

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

最后修改时间:
admin
上一篇 2025年03月29日 22:02
下一篇 2025年03月29日 22:25

评论已关闭