DarkForums Members
Posts
21
Threads
0
Joined
Oct 2025
1 Months
DarkForums Members
Posts
15
Threads
0
Joined
Jun 2025
6 Months
DarkForums Members
Posts
30
Threads
0
Joined
Nov 2025
1 Months
DarkForums Members
Posts
41
Threads
0
Joined
Oct 2025
2 Months
thanks
(12-09-25, 10:45 AM)privilege Wrote: Target: LINISTORE.ID
Records: 235
Date: 2024
Status: Unreleased / Private
About LINISTORE.ID:
LINISTORE.ID is an Indonesian retail and logistics platform that manages
warehouse operations, admin accounts, and staff access for various services.
The system is tied to station IDs, warehouse IDs, and admin panels,
making these credentials critical for operational security.
Dataset Overview:
- Total of 235 user records extracted.
- Data includes both **admin-level accounts** and **staff accounts**.
- Columns contained in this dump:
ID, Name, Email, Phone, Password, Reset Token, Reset Token Expires,
Status, Last Login At, Created At, Updated At, Role Slug, Station ID,
Warehouse ID, Admin Code, Fast Print
- Passwords are stored using bcrypt ($2a$10$).
- Multiple admin accounts with emails linked to corporate domains
(e.g., @kelola.id, @mgmlog.id, @sim.co.id).
- Staff accounts cover various warehouse and logistics operations,
including names, phone numbers, and active status.
- Contains detailed timestamps for account creation, updates, and
last login activities.
Impact:
The exposure of these records compromises internal operations,
warehouse administration, and user authentication security.
The presence of **active admin accounts with bcrypt hashes** makes this
dataset particularly sensitive.
───────────────────────────────
───────────────────────────────
DarkForums Members
Posts
25
Threads
0
Joined
Dec 2025
1 Weeks
23-12-25, 04:00 PM
(This post was last modified: 23-12-25, 04:02 PM by M11F.)
(12-09-25, 10:45 AM)privilege Wrote: Target: LINISTORE.ID
Records: 235
Date: 2024
Status: Unreleased / Private
About LINISTORE.ID:
LINISTORE.ID is an Indonesian retail and logistics platform that manages
warehouse operations, admin accounts, and staff access for various services.
The system is tied to station IDs, warehouse IDs, and admin panels,
making these credentials critical for operational security.
Dataset Overview:
- Total of 235 user records extracted.
- Data includes both **admin-level accounts** and **staff accounts**.
- Columns contained in this dump:
ID, Name, Email, Phone, Password, Reset Token, Reset Token Expires,
Status, Last Login At, Created At, Updated At, Role Slug, Station ID,
Warehouse ID, Admin Code, Fast Print
- Passwords are stored using bcrypt ($2a$10$).
- Multiple admin accounts with emails linked to corporate domains
(e.g., @kelola.id, @mgmlog.id, @sim.co.id).
- Staff accounts cover various warehouse and logistics operations,
including names, phone numbers, and active status.
- Contains detailed timestamps for account creation, updates, and
last login activities.
Impact:
The exposure of these records compromises internal operations,
warehouse administration, and user authentication security.
The presence of **active admin accounts with bcrypt hashes** makes this
dataset particularly sensitive.
───────────────────────────────
───────────────────────────────
Nice!!!
DarkForums Members
Posts
10
Threads
0
Joined
Oct 2025
1 Months
DarkForums Members
Posts
101
Threads
19
Joined
Nov 2023
2 Years
DarkForums Members
Posts
10
Threads
0
Joined
Dec 2025
Few hours
|