Hidden contentHidden content
Now, use this command to find the sensitive information python3 shotlooter.py –code sjgmm1
root@kali:/home/iicybersecurity/shotlooter# python3 shotlooter.py --code sjgmm1
Analyzing: sjgmm2
Analyzing: sjgmm3
Analyzing: sjgmm4
Analyzing: sjgmm5
Analyzing: sjgmm6...