Tried to use this, but I am getting the following error with Python 3.4. on Linux (Gentoo).
[+] Checking email in public leaks...
Traceback (most recent call last):
File "./Cr3d0v3r.py", line 119, in <module>
main()
File "./Cr3d0v3r.py", line 100, in main
to_print = ispwned.parse_data(email)
File "/home/zeno/.software/Cr3dOv3r/ispwned.py", line 18, in parse_data
data = check(email,"His shit :D")
File "/home/zeno/.software/Cr3dOv3r/ispwned.py", line 7, in check
res = json.loads(req.text)
File "/usr/lib64/python3.4/json/__init__.py", line 318, in loads
return _default_decoder.decode(s)
File "/usr/lib64/python3.4/json/decoder.py", line 343, in decode
obj, end = self.raw_decode(s, idx=_w(s, 0).end())
File "/usr/lib64/python3.4/json/decoder.py", line 361, in raw_decode
raise ValueError(errmsg("Expecting value", s, err.value)) from None
ValueError: Expecting value: line 1 column 1 (char 0)