Import:
1. Add into "importbreach" sorted and filtered breaches to make them look
like "email@email.com:plaintext_password" (do not use space or special symbols in filename)
2. Then run ./sorter.sh
Information:
All imported files are in "imported.log" file.
All data is in "data" folder.
Use only for educational and penetration testing purposes.