# dehashed.py

Dehashed is pretty handy for finding creds from various leaks/breaches.

# Search using Dehashed from sm00v

Personally I like to grab this repo, and then conduct a search like so:

dehashed.py -u you@yourdomain.com -a YOUR-API-KEY-HERE -d targetdomain.com -o

# Prep captured creds for spraying

cat *cracked* | sort -uf > company-creds.txt

# Clean up captured creds file (optional)

If you used the DeHashed-API-Tool to create an export of creds, you'll want to replace , with : so it's easier to feed the user:pass file to tools like go365:

sed -i 's/,/:/g' file-with-usernames-and-passwords.txt

Then you could take the company-creds.txt and spray them if you so desire.