From 6bdfed7f0b1d9779d66d8ab5e82559c6847a2b77 Mon Sep 17 00:00:00 2001 From: Edward Betts Date: Wed, 5 Jul 2023 08:52:21 +0200 Subject: [PATCH] Correct spelling mistakes --- CONTRIBUTING.md | 2 +- PyPi.rst | 2 +- README.md | 16 ++++++++-------- h8mail/utils/classes.py | 2 +- h8mail/utils/helpers.py | 2 +- h8mail/utils/intelx.py | 6 +++--- h8mail/utils/localgzipsearch.py | 4 ++-- h8mail/utils/run.py | 6 +++--- 8 files changed, 20 insertions(+), 20 deletions(-) diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index a24f46c..ac4dcdc 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -18,7 +18,7 @@ * Pull requests should be merged into the latest development branch, not in the main branch * If there is no on-going development branch, there should still be the current version's dev branch - * If unsure, open an issue and you'll be pointed to the right branch, or a seperate branch can be created for you + * If unsure, open an issue and you'll be pointed to the right branch, or a separate branch can be created for you * Make sure your code passes the included tests. You can run them by using `python3 -m unittest` in h8mail's top level directory diff --git a/PyPi.rst b/PyPi.rst index 3a17ade..d06d306 100644 --- a/PyPi.rst +++ b/PyPi.rst @@ -26,7 +26,7 @@ Features -------- * Email pattern matching (reg exp), useful for reading from other tool outputs -* Loosey patterns for local searchs ("john.smith", "evilcorp") +* Loosey patterns for local searches ("john.smith", "evilcorp") * Painless install. Available through `pip`, only requires `requests` * Small and fast Alpine Dockerfile available * CLI or Bulk file-reading for targeting diff --git a/README.md b/README.md index 16e70b2..2f7d9d7 100644 --- a/README.md +++ b/README.md @@ -37,7 +37,7 @@ * :mag_right: Email pattern matching (reg exp), useful for reading from other tool outputs * :earth_africa: Pass URLs to directly find and target emails in pages -* :dizzy: Loosey patterns for local searchs ("john.smith", "evilcorp") +* :dizzy: Loosey patterns for local searches ("john.smith", "evilcorp") * :package: Painless install. Available through `pip`, only requires `requests` * :white_check_mark: Bulk file-reading for targeting * :memo: Output to CSV file or JSON @@ -66,14 +66,14 @@ | [HaveIBeenPwned Pastes(v3)](https://haveibeenpwned.com/Pastes) | URLs of text files mentioning targets | :white_check_mark: :key: | | [Hunter.io](https://hunter.io/) - Public | Number of related emails | :white_check_mark: | | [Hunter.io](https://hunter.io/) - Service (free tier) | Cleartext related emails, Chasing | :white_check_mark: :key: | -| [Snusbase](https://api.snusbase.com/admin/purchase) - Service | Cleartext passwords, hashs and salts, usernames, IPs - Fast :zap: | :white_check_mark: :key: | +| [Snusbase](https://api.snusbase.com/admin/purchase) - Service | Cleartext passwords, hashes and salts, usernames, IPs - Fast :zap: | :white_check_mark: :key: | | [Leak-Lookup](https://leak-lookup.com/) - Public | Number of search-able breach results | :white_check_mark: (:key:) | -| [Leak-Lookup](https://leak-lookup.com/) - Service | Cleartext passwords, hashs and salts, usernames, IPs, domain | :white_check_mark: :key: | +| [Leak-Lookup](https://leak-lookup.com/) - Service | Cleartext passwords, hashes and salts, usernames, IPs, domain | :white_check_mark: :key: | | [Emailrep.io](https://emailrep.io/) - Service (free) | Last seen in breaches, social media profiles | :white_check_mark: :key: | -| [scylla.so](https://scylla.so/) - Service (free) | Cleartext passwords, hashs and salts, usernames, IPs, domain | :construction: | -| [Dehashed.com](https://dehashed.com/) - Service | Cleartext passwords, hashs and salts, usernames, IPs, domain | :white_check_mark: :key: | -| [IntelX.io](https://intelx.io/signup) - Service (free trial) | Cleartext passwords, hashs and salts, usernames, IPs, domain, Bitcoin Wallets, IBAN | :white_check_mark: :key: | -| :new: [Breachdirectory.org](https://breachdirectory.org) - Service (free) | Cleartext passwords, hashs and salts, usernames, domain | :construction: :key: | +| [scylla.so](https://scylla.so/) - Service (free) | Cleartext passwords, hashes and salts, usernames, IPs, domain | :construction: | +| [Dehashed.com](https://dehashed.com/) - Service | Cleartext passwords, hashes and salts, usernames, IPs, domain | :white_check_mark: :key: | +| [IntelX.io](https://intelx.io/signup) - Service (free trial) | Cleartext passwords, hashes and salts, usernames, IPs, domain, Bitcoin Wallets, IBAN | :white_check_mark: :key: | +| :new: [Breachdirectory.org](https://breachdirectory.org) - Service (free) | Cleartext passwords, hashes and salts, usernames, domain | :construction: :key: | *:key: - API key required* @@ -113,7 +113,7 @@ optional arguments: ip, hash, domain. Performs an implicit "loose" search when searching locally --loose Allow loose search by disabling email pattern - recognition. Use spaces as pattern seperators + recognition. Use spaces as pattern separators -c CONFIG_FILE [CONFIG_FILE ...], --config CONFIG_FILE [CONFIG_FILE ...] Configuration file for API keys. Accepts keys from Snusbase, WeLeakInfo, Leak-Lookup, HaveIBeenPwned, diff --git a/h8mail/utils/classes.py b/h8mail/utils/classes.py index 53799af..9343e42 100644 --- a/h8mail/utils/classes.py +++ b/h8mail/utils/classes.py @@ -14,7 +14,7 @@ class local_breach_target: """ Class is called when performing local file search. This class is meant to store found data, to be later appended to the existing target objects. - local_to_targets() tranforms to target object + local_to_targets() transforms to target object Used by both cleartext and gzip search """ diff --git a/h8mail/utils/helpers.py b/h8mail/utils/helpers.py index 5018100..b959e48 100644 --- a/h8mail/utils/helpers.py +++ b/h8mail/utils/helpers.py @@ -192,7 +192,7 @@ def check_scylla_online(): """ Checks if scylla.so is online """ - # Supress SSL Warning on UI + # Suppress SSL Warning on UI # https://github.com/khast3x/h8mail/issues/64 try: re = requests.head( diff --git a/h8mail/utils/intelx.py b/h8mail/utils/intelx.py index c9affa5..9006e93 100644 --- a/h8mail/utils/intelx.py +++ b/h8mail/utils/intelx.py @@ -249,7 +249,7 @@ def INTEL_SEARCH_RESULT(self, id, limit): Return results from an initialized search based on its ID status (results status): - - 0: Sucess with results. + - 0: Success with results. - 1: No more results available. - 2: Search ID not found. - 3: No results yet, but keep trying. @@ -376,7 +376,7 @@ def PHONEBOOK_SEARCH_RESULT(self, id, limit=1000, offset=-1): ___________________________________________ RETURN VALUES status (results status): - - 0: Sucess with results. + - 0: Success with results. - 1: No more results available. - 2: Search ID not found. - 3: No results yet, but keep trying. @@ -398,7 +398,7 @@ def query_results(self, id, limit): def query_pb_results(self, id, limit): """ - Query the results fom a phonebook search. + Query the results from a phonebook search. Meant for usage within loops. """ results = self.PHONEBOOK_SEARCH_RESULT(id, limit) diff --git a/h8mail/utils/localgzipsearch.py b/h8mail/utils/localgzipsearch.py index f14633e..ae00b43 100644 --- a/h8mail/utils/localgzipsearch.py +++ b/h8mail/utils/localgzipsearch.py @@ -65,7 +65,7 @@ def local_gzip_search(files_to_parse, target_list): """ Receives list of all files to check for target_list. Starts a worker pool, one worker per file. - Return list of local_breach_targets objects to be tranformed in target objects. + Return list of local_breach_targets objects to be transformed in target objects. """ original_sigint_handler = signal.signal(signal.SIGINT, signal.SIG_IGN) pool = Pool() @@ -94,7 +94,7 @@ def local_search_single_gzip(files_to_parse, target_list): """ Single process searching of every target_list emails, in every files_to_parse list. To be used when stability for big files is a priority - Return list of local_breach_target objects to be tranformed in target objects + Return list of local_breach_target objects to be transformed in target objects """ found_list = [] for file_to_parse in files_to_parse: diff --git a/h8mail/utils/run.py b/h8mail/utils/run.py index 4d9bd35..e2f7b76 100644 --- a/h8mail/utils/run.py +++ b/h8mail/utils/run.py @@ -32,7 +32,7 @@ def target_factory(targets, user_args): """ - Receives list of emails and user args. Fetchs API keys from config file using user_args path and cli keys. + Receives list of emails and user args. Fetches API keys from config file using user_args path and cli keys. For each target, launch target.methods() associated to found config artifacts. Handles chase logic with counters from enumerate() """ @@ -227,7 +227,7 @@ def h8mail(user_args): def parse_args(args): """ - Seperate functions to make it easier to run tests + Separate functions to make it easier to run tests Pass args as an array """ parser = argparse.ArgumentParser( @@ -257,7 +257,7 @@ def parse_args(args): parser.add_argument( "--loose", dest="loose", - help="Allow loose search by disabling email pattern recognition. Use spaces as pattern seperators", + help="Allow loose search by disabling email pattern recognition. Use spaces as pattern separators", action="store_true", default=False, )