![]() |
|
SELLING [UKRAINE] SymbolTransport Source code + Databases - Printable Version +- BreachForums (https://breached.sh) +-- Forum: Marketplace (https://breached.sh/Forum-Marketplace) +--- Forum: Sellers Place (https://breached.sh/Forum-Sellers-Place) +--- Thread: SELLING [UKRAINE] SymbolTransport Source code + Databases (/Thread-SELLING-UKRAINE-SymbolTransport-Source-code-Databases) |
[UKRAINE] SymbolTransport Source code + Databases - bytetobreach - Oct 27, 2025 The database for SymbolTransport, along with the source code for their national fare collection system is available. They provide different cashless payment systems, with a focus on a automated fare collection system. These guys are official Visa partners, and they are much bigger than they seemed in the beggining. Their network is actually fucking huge, and make up a very important part of the Ukrainian transportation infrastrcure, and more clients / countries. The data contain the Postgres databases used by the company, plus a full backup of the official git repo's, with sources codes, config files. With the configuration files leaked, they will be forced to change the whole system...to the bone. Reverse shell is available, but host is a secured docker without much posibility for escalation. Not that it matters, since all objectives were achieved. Now, with both Russkies and Ukkies attacked, i wont be accused of being partial. Pasted image.png https://dump.li/image/84974856e9b5cff3.png Pasted image (2).png https://dump.li/image/04ce53b327ea1586.png Pasted image (3).png https://dump.li/image/ac6129b5a980bd0a.png Pasted image (4).png https://dump.li/image/acf091903c46cd7f.png Pasted image (5).png https://dump.li/image/cb6f881373eab068.png Pasted image (6).png https://dump.li/image/dd025cfca1016896.png Pasted image (7).png https://dump.li/image/e0d24d6a148b3d1d.png Pasted image (8).png https://dump.li/image/35f163298e2b3398.png Pasted image (9).png https://dump.li/image/79b3608de8ea1b4c.png Pasted image (10).png https://dump.li/image/fb900b18db89c0e8.png Pasted image (11).png https://dump.li/image/bda690628115ef01.png Pasted image (12).png https://dump.li/image/38c49f09f9f41ddc.png Pasted image (13).png https://dump.li/image/e4ae6608691fa62a.png Pasted image (14).png https://dump.li/image/47e2185323287d7e.png Pasted image (15).png https://dump.li/image/779f346c984ffbb8.png Pasted image (16).png https://dump.li/image/bb6cd3bfac28f462.png Pasted image (17).png https://dump.li/image/4378d87f0be03b25.png Pasted image (18).png https://dump.li/image/0bf15124ed148aef.png Pasted image (19).png https://dump.li/image/a043dfffdfb9ed82.png BACKUPLINK:https://www.dropbox.com/scl/fo/rc86bv27fpxwq9ame3yxh/AK8tc7GVFZ2nrXDScVU6jSY?rlkey=o1fvg0kzv581sjy06rtqwj4zr&st=x18xdk08&dl=0 --------------------------------------------------------------------------- Session: 05c2db4775cb46350f16814dfe3bfa856664f315585653e4c368af08ce50b0c31b Ricochet: vgrps2kcrwdlxr5zpnozdwtgnjgpxisftbomw5fiajtiom7tergp2kyd Email : Bytetobreach@tuta.com / george_citron@pm.me Signal : @bytetobreach X: @bytetobreach Telegram : Bytetobreach (not active anymore) |