BLUELAY
Searches online paste sites for certain search terms which can indicate a possible data breach.
Install / Use
/learn @xakepnz/BLUELAYREADME
BLUELAY
Description:
Search keywords against websites that have been indexed/spidered by Google.<br />
- Choose what sites to search against, what keywords to search for.<br />
- Examples could be: hash values, private secrets, email addresses or simply domain names.<br />
- Optionally proxy your requests through custom proxies to avoid Google banning.<br />
Proof of Concept:
- keywords.conf: BLUELAY
- sources.conf: github.com

Install:
git clone https://github.com/xakepnz/BLUELAY.git
cd BLUELAY
pip install -r requirements.txt
Usage:
python3 bluelay.py
Edit the three config files:<br />
- keywords.conf containing all the keywords you want to search for.<br />
- sources.conf all of the sites you want to search against.<br />
- proxies.conf proxies to route requests through, to avoid Google ban.<br />
Examples:
<b>keywords.conf</b>
# These are the keywords to search against Google. They can be simply domain names, or specific terminology.
# Anything behind a hashtag like this line, will be ignored.
BLUELAY
<b>sources.conf</b>
# These are new line separated domain names that you want to search against.
# The domain names must be able to be indexed/spidered by Google.
# Anything behind a hashtag like this line, will be ignored.
# pastebin.com
# pastie.org.ru
# paste.org
# hackforums.net
# antichat.ru
github.com
<b>proxies.conf</b>
# Enter new proxies below on a new line
# Anything behind a hashtag like this line, will be ignored.
# Format: schema://ip_or_domain:port
# http://1.1.1.1:80
# https://1.1.1.1:443
