Skip to content

We're in the exposin' Nazis business. And cousin, business is a-boomin'.

Notifications You must be signed in to change notification settings

Ringmast4r/NAZIS

Repository files navigation

NAZIS

NAZIS

Visitors

Exposing white supremacists through Gravatar email hash recovery.

View the Pipeline Report

Gravatar publicly exposes unsalted MD5/SHA256 hashes of user email addresses on every WordPress site. This project uses a three-stage OSINT pipeline to recover the real email addresses of contributors, authors, and commenters on known neo-Nazi and white supremacist websites.


The Gravatar Problem

Every WordPress site leaks Gravatar hashes through its REST API (/wp-json/wp/v2/users). These hashes are derived from email addresses with no salt, no key stretching, and no rate limiting. Anyone with an account on a WordPress site has their email hash publicly visible.

email: john.smith@gmail.com
  MD5: 271b8427864f0c82acf2a7fde5c6e8e6
SHA256: 8e4d25e0587baa8edeba3bce2fd93d83e3d5e21f8...

These hashes are PUBLIC on every WordPress site the user has an account on.

This project exploits that design flaw specifically against hate sites to identify the people behind anonymous accounts.


Pipeline

 [1] WP Determiner          [2] Hash Hunter            [3] Hash Cracker
 ==================         ===============            ================
 Input: hate site list      Input: WP sites            Input: hash database
 Check for WordPress   -->  Extract Gravatar      -->  Pattern-based email
 Output: confirmed WP       hashes via REST API        recovery
                            + sitemaps + scraping
                            Output: hashes.db          Output: cracked.db

 627 sites checked          1,997 hashes collected     377 emails recovered
 213 confirmed WP           69 domains with data       17 domains cracked

Stage 1: WordPress Determiner

Identifies which target sites run WordPress by checking for known WordPress signatures (REST API endpoints, wp-content paths, meta tags, etc.).

Usage

wp-determiner.exe
Feature Description
Bulk scan Load a list of domains from file
Single scan Check one domain
Recheck Re-check previously scanned sites
Database SQLite storage with scan history
Detection methods REST API probe, HTML signatures, header analysis

Target Lists

Lists of known extremist websites organized by category are in lists/:

  • Nazis.txt - Neo-Nazi, white supremacist, and hate group websites
  • Additional lists for cross-referencing

Stage 2: Hash Hunter

Aggressively collects Gravatar email hashes from confirmed WordPress sites using four methods:

  1. REST API - Full pagination of /wp-json/wp/v2/users with retry logic
  2. Sitemap parsing - /sitemap.xml, /wp-sitemap-users-1.xml
  3. Author page scraping - /author/, /team/, /about/, /staff/ pages
  4. Deep scraping - Comment sections, internal pages, RSS feeds

Usage

hash-hunter.exe
Key Command Description
1 Scan Single target scan
2 Bulk Bulk scan from target file
3 Rescan Retry incomplete sites
4 Stats Database statistics
5 Export Export hashes to CSV

Database

Stores results in hashes.db:

Table Purpose
domains Scanned sites with completion status
hashes Collected Gravatar hashes with metadata
hash_history Change tracking

Each hash record includes: domain, user ID, username, display name, hash, hash type (MD5/SHA256), avatar URL, source method, and timestamps.


Stage 3: Hash Cracker

Pattern-based email recovery tool. Unlike traditional wordlist crackers (Hashcat, John the Ripper), this generates candidate emails dynamically from metadata already collected by Hash Hunter.

Why Pattern-Based?

Traditional (Hashcat) Hash Cracker
Input Massive wordlists (GB+) Username + display name + domain
Approach Brute force Contextual pattern generation
Email-aware No Yes - 772+ email providers
Name-aware No Yes - cultural patterns, nicknames, corporate formats

Pattern Categories

  • Username match (54% of cracks) - username@sitedomain.com
  • Corporate patterns - first.last@, flast@, firstl@
  • Scandinavian short codes - first2+last2 format
  • International patterns - Hispanic, Asian, German, Celtic naming conventions
  • Nickname/diminutive - william -> bill, robert -> bob, etc.
  • Numeric suffixes - birth years, common sequences

Usage

hashcracker.exe
Key Command Description
1 Load DB Import hashes from Hash Hunter
2 Wordlist Load additional patterns
3 Crack Start cracking
4 View View cracked results
5 Export Export to CSV

Results

Current Statistics

Metric Count
Sites checked 627
WordPress confirmed 213
Gravatar hashes collected 1,997
Emails recovered 377
Domains with cracked emails 17

Cracked by Domain

Domain Emails Recovered Description
amren.com 257 American Renaissance - white supremacist publication
altright.com 64 Alt-right movement hub
veteranstoday.com 25 Conspiracy / antisemitic content
attackthesystem.com 8 National-anarchist / far-right
faithandheritage.com 4 Christian Identity / white nationalist
therightstuff.biz 4 Neo-Nazi podcast network (TDS)
eurofolkradio.com 3 White supremacist radio
americannaziparty.com 1 American Nazi Party
bnp.org.uk 1 British National Party
codoh.com 1 Holocaust denial
proudboysusa.com 1 Proud Boys
Others 8 Various extremist sites

Author

Ringmast4r

License

Proprietary. All rights reserved.

About

We're in the exposin' Nazis business. And cousin, business is a-boomin'.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages