Get Mystery Box with random crypto!

https://anonfiles.com/L0S9Dd5ex9/alldb_sql 麦块漏洞泄露2021 1. | @PDDcp🕊️

https://anonfiles.com/L0S9Dd5ex9/alldb_sql
麦块漏洞泄露2021
1.5G的sql

2013年,中国电子商务服务京东遭遇数据泄露,暴露了13GB的数据,其中包含7700万个唯一电子邮件地址。这些数据还包括存储为SHA-1散列的用户名、电话号码和密码。

新闻上:
https://ecommercechinaagency.com/jd-ecommerce-giant-made-apology-user-data-leakage/

注:
此文件是160万条条目示例。

下载1 :
http://bc.vc/T0hFAms
https://oke.io/DvrCy
https://dlslink.net/86f6133d
https://likn.xyz/RVXqp

下载2 : (紧凑型)
https://oxy.cloud/d/rdMe

下载3 :
https://filecrypt.cc/Container/B88DF89951.html
http://gigapeta.com/dl/10044196a2ff8db
https://rapidgator.net/file/899a2ba1a119ad60677b3766f2104e18
http://www.filefactory.com/file/rkgdiwdplf2/JD.com%20Database%20Leaked%20in%202013.rar
https://nitro.download/view/FB3CF70072E2510/JD.com_Database_Leaked_in_2013.rar
https://ddownload.com/2d1rt7g4m6rq/JD.com_Database_Leaked_in_2013.rar

2.9 亿 WHOIS 数据库记录泄露] 289.954.607 LINES

下载链接:https://bit.ly/3evFJzA
超级密码:@GuntherMagnuson

它包含什么

1- 域
2- 所有者姓名
3- 所有者电子邮件

mega.nz (https://bit.ly/3evFJzA)

https://mega.nz/file/07gEUS7Y#qf9DOSAQUeTAc-28THgOQLi_GJdbZWAvNrowvztdwzw

raidbot src

领英1.6亿与领英7亿不重源
In May 2016, LinkedIn had 164 million email addresses and passwords exposed. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data.

Compromised data: Email addresses, Passwords

Download:
http://scadonsak.com/48AT/LinkedIn_datab...y_2016.rar
https://ddl.to/8xym9io07wad/LinkedIn_dat...y_2016.rar
https://dropapk.to/7ft7n2hry3yy/LinkedIn...y_2016.rar
https://hugesharing.net/184vo3so2b0o/Lin...y_2016.rar
https://uploadrar.com/gkcj5t41ffhy/Linke...y_2016.rar

八十一亿邮箱库
magnet:?xt=urn:btih:4920C210B30DE7BEC53B35266BD3E77ECE1A75FE
13亿邮箱库
magnet:?xt=urn:btih:09250E1953E5A7FEFEAA6206E81D02E53B5B374A
32亿邮箱解压密码
+w/P3PRqQQoJ6g
magnet:?xt=urn:btih:4D813B094D46E387E681921EC17CF1F99AB2E954
6亿邮箱库
magnet:?xt=urn:btih:C81E0644FD67F73D81B94A31E3FC726679638A98
网易邮箱52G
magnet:?xt=urn:btih:066c588a6fe43ce29a07c96e4063357eb18433ab
扫密正绝对够用了

BIG DB 593G 2万份中外国库
量力而行
magnet:?xt=urn:btih:ba304cab082bad215263bd7f66902e128eccc7a3&dn=bigDB&tr=udp://tracker.openbittorrent.com:80&tr=udp://tracker.opentrackr.org:1337/announce

沙特军方和政府内部文件3G泄露
文件下载链接: https://mega.nz/file/SVJTSABQ#cc5GQK_X_3WtHHFYSAGDa-la3Ngf_ErSs38lbOH16Z0
沙特阿拉伯的压迫政权。在不久的将来,更多类似的泄密事件将被分享,以帮助争取完全自由的斗争。

以色列最新
国防部人员信息
https://anonfiles.com/VbY2p454xd/Israel_MOD_zip

900份墨西哥政客、名人购买豪华车的文件众议院议员购买豪华车的文件包含姓名、电子邮件、发票、银行转账文件、身份证、车牌。

下载:

https://www.mediafire.com/file/kt2uttbgn...P.zip/file

whois 2.9亿 290G
https://cf-simple-s3-origin-cloudfrontfors3-034127375775.s3.amazonaws.com/fashow/intelx_whois_scrape.7z


https://nyc3.digitaloceanspaces.com/vuctest/intelx_whois_scrape.7z

https://storage.sbg.cloud.ovh.net/v1/AUTH_45be67e388214025a51de6c999d76dfb/sozeds/intelx_whois_scrape.7z?temp_url_sig=23025a4d8d165f84cc3694ea214e04b7451b1fde&temp_url_expires=1673835367

https://og.money/intelx/intelx_whois_scrape.7z

https://nightlion.co/intelx_whois_scrape.7z