Edr4 / Dataleaks
Check if your email or username is in a data breach
β23Updated 2 years ago
Alternatives and similar repositories for Dataleaks:
Users that are interested in Dataleaks are comparing it to the libraries listed below
- π΅οΈ Email osint toolβ62Updated last year
- β59Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accuβ¦β224Updated 5 months ago
- A Personal Collection of Infosec Dorksβ195Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written β¦β131Updated 7 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectβ¦β75Updated 5 months ago
- β50Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.β100Updated last year
- Search tools to help you find people, focused towards UK resources.β98Updated 2 months ago
- SCIENCE, HACKING AND SECURITYβ12Updated 2 years ago
- IoT Camera Reconnaissance and Live Viewerβ139Updated 6 months ago
- Automatic tool to find Google Dorksβ33Updated 3 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.β131Updated last year
- Python3 script to dump breach data from Dehashedβ24Updated 6 months ago
- All About Web Recon & OSINTβ113Updated last year
- As a regular contributor to Project WhatsMyName, this is a script I made for myself to check sites are workingβ94Updated 8 months ago
- GitOSINT: The OSINT Powerhouse for Discord. The go-to Discord bot for Open Source Intelligence (OSINT).β96Updated last year
- NetProbe: Network Probeβ153Updated 4 months ago
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β53Updated last month
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRβ¦β121Updated 5 months ago
- γπ§±γTest a list of payloads and see if you can bypass itβ55Updated 2 years ago
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent β¦β25Updated last year
- CeWLeR - Custom Word List generator Redefined. CeWL alternative in Python, based on the Scrapy framework.β97Updated 6 months ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.β70Updated 3 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in aβ¦β103Updated 7 months ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!β56Updated 2 weeks ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.β15Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is aβ¦β148Updated 6 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.β105Updated 2 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types lβ¦β123Updated last month