Edr4 / DataleaksLinks
Check if your email or username is in a data breach
☆44Updated 3 years ago
Alternatives and similar repositories for Dataleaks
Users that are interested in Dataleaks are comparing it to the libraries listed below
Sorting:
- ☆66Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆32Updated last month
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆28Updated last year
- 🕵️ OSINT Tool (github tracker)☆156Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆104Updated last year
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆21Updated 3 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆196Updated 4 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆77Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆83Updated 3 months ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dum…☆33Updated 2 months ago
- Google dorking tool☆231Updated 10 months ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆42Updated 8 months ago
- Sifter - All purpose penetration testing op-center☆76Updated 2 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆40Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- PrivacyNet: Privacy Network☆49Updated 11 months ago
- Open source intelligence tools and resources☆126Updated 9 months ago
- capNcook - a dark web exploration tool☆105Updated 10 months ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆83Updated 2 years ago
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆57Updated last month
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- Odinova Digital Tiger is an advanced application designed for Open-Source Intelligence (OSINT), equipped with versatile tools and a user-…☆81Updated 3 weeks ago
- 🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation autom…☆174Updated last year
- Helping you delete your old accounts☆87Updated last year
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆117Updated 2 years ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆237Updated 11 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆94Updated last year
- Windows Hacking FrameWork using Reverse Shell☆107Updated 4 months ago
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆68Updated 3 years ago
- ☆10Updated 6 years ago