03-09-25, 03:17 AM
This is exfiltrated data coming from various sources
Serbian Data
![[Image: Coat_of_arms_of_Serbi.png]](https://upload.wikimedia.org/wikipedia/commons/d/df/Coat_of_arms_of_Serbi.png)
This post includes ROUGH ULP Scrapes and Logs of Data gathered through various means
WARNING THIS IS A MESSY POST
Contents:
Lines: 1365956
Year: 2025
Format: .txt
Sample
Educational Overview of GlorySec Operations
I came across some publicly discussed operations of GlorySec, a pro-Western group that seems to target corrupt regimes. For educational purposes, I wanted to summarize what their activity looks like without sharing any sensitive or private information.
For example:
Serbian Data
![[Image: Coat_of_arms_of_Serbi.png]](https://upload.wikimedia.org/wikipedia/commons/d/df/Coat_of_arms_of_Serbi.png)
This post includes ROUGH ULP Scrapes and Logs of Data gathered through various means
WARNING THIS IS A MESSY POST
Contents:
Lines: 1365956
Year: 2025
Format: .txt
Sample
Quote:system.nbaa.go.tz/:hellendismas04@gmail.com:Hellen@02
account.skrill.com/signup/:eloymaxime57@gmail.com:Maxou1356
safepal.live/wp-login.php:safepal:TNM6hG~cW5u0p_mh
www.roblox.com/login:fless9922q:val11xd44
accounts.google.com/:Izdoomer@gmail.com:Ai230920092009
www.good-pocket.com/index/user/register:0103038707:nz375003l
signup.ebay.com.my/pa/crte:mikadif99@gmail.com:mYafNKn@3yDmmB8
auth.max.com/login:morgado1301@gmail.com:JUANRO1301
app.gohighlevel.com/:jeroenkumeling@gmail.com:hTnDtzNF8@8VUSEm
accounts.google.com/:estebanimbaquingo125@gmail.com:ImBaco125
linkunlocker.com/signup:Dandyword:_Cj2A_PBJz8bzh@
Educational Overview of GlorySec Operations
I came across some publicly discussed operations of GlorySec, a pro-Western group that seems to target corrupt regimes. For educational purposes, I wanted to summarize what their activity looks like without sharing any sensitive or private information.
For example:
- They appear to collect and analyze large datasets, often using automated review tools.
- They generate sample outputs to demonstrate their methods, but these samples are fully anonymized or synthetic
- Their operations are mostly focused on exposing security weaknesses in oppressive regimes.
