Banned
Posts
33
Threads
0
Joined
Sep 2025
Reputation
3 Months
WAAA WOWOWOWO THX
Ban reason: leeching (Permanent)
DarkForums Members
Posts
10
Threads
0
Joined
Jul 2025
6 Months
Nice info. Thank you, Bro.
DarkForums Members
Posts
8
Threads
0
Joined
Aug 2025
4 Months
DarkForums Members
Posts
5
Threads
0
Joined
Sep 2025
3 Months
Banned
Posts
88
Threads
0
Joined
Apr 2023
Reputation
2 Years
Thanks
Ban reason: leeching (Permanent)
DarkForums Members
Posts
92
Threads
0
Joined
Aug 2025
5 Months
DarkForums Members
Posts
29
Threads
0
Joined
Jan 2025
11 Months
DarkForums Members
Posts
3
Threads
0
Joined
Sep 2025
3 Months
(12-09-25, 10:45 AM)privilege Wrote: Target: LINISTORE.ID
Records: 235
Date: 2024
Status: Unreleased / Private
About LINISTORE.ID:
LINISTORE.ID is an Indonesian retail and logistics platform that manages
warehouse operations, admin accounts, and staff access for various services.
The system is tied to station IDs, warehouse IDs, and admin panels,
making these credentials critical for operational security.
Dataset Overview:
- Total of 235 user records extracted.
- Data includes both **admin-level accounts** and **staff accounts**.
- Columns contained in this dump:
ID, Name, Email, Phone, Password, Reset Token, Reset Token Expires,
Status, Last Login At, Created At, Updated At, Role Slug, Station ID,
Warehouse ID, Admin Code, Fast Print
- Passwords are stored using bcrypt ($2a$10$).
- Multiple admin accounts with emails linked to corporate domains
(e.g., @kelola.id, @mgmlog.id, @sim.co.id).
- Staff accounts cover various warehouse and logistics operations,
including names, phone numbers, and active status.
- Contains detailed timestamps for account creation, updates, and
last login activities.
Impact:
The exposure of these records compromises internal operations,
warehouse administration, and user authentication security.
The presence of **active admin accounts with bcrypt hashes** makes this
dataset particularly sensitive.
───────────────────────────────
───────────────────────────────
DarkForums Members
Posts
14
Threads
0
Joined
Sep 2025
3 Months
(12-09-25, 10:45 AM)privilege Wrote: Target: LINISTORE.ID
Records: 235
Date: 2024
Status: Unreleased / Private
About LINISTORE.ID:
LINISTORE.ID is an Indonesian retail and logistics platform that manages
warehouse operations, admin accounts, and staff access for various services.
The system is tied to station IDs, warehouse IDs, and admin panels,
making these credentials critical for operational security.
Dataset Overview:
- Total of 235 user records extracted.
- Data includes both **admin-level accounts** and **staff accounts**.
- Columns contained in this dump:
ID, Name, Email, Phone, Password, Reset Token, Reset Token Expires,
Status, Last Login At, Created At, Updated At, Role Slug, Station ID,
Warehouse ID, Admin Code, Fast Print
- Passwords are stored using bcrypt ($2a$10$).
- Multiple admin accounts with emails linked to corporate domains
(e.g., @kelola.id, @mgmlog.id, @sim.co.id).
- Staff accounts cover various warehouse and logistics operations,
including names, phone numbers, and active status.
- Contains detailed timestamps for account creation, updates, and
last login activities.
Impact:
The exposure of these records compromises internal operations,
warehouse administration, and user authentication security.
The presence of **active admin accounts with bcrypt hashes** makes this
dataset particularly sensitive.
───────────────────────────────
───────────────────────────────
DarkForums Members
Posts
94
Threads
0
Joined
Feb 2025
10 Months
|