Search breached data on private nodes, darkweb, internet, end-to-end channels
☆142Nov 27, 2019Updated 6 years ago
Alternatives and similar repositories for BreachedDataScraper
Users that are interested in BreachedDataScraper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- A tool to harvest credentials from leaked data dump☆86Dec 7, 2021Updated 4 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆193Oct 29, 2019Updated 6 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆23Apr 29, 2022Updated 4 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- sync google contacts with information from the dominos data breach <3☆11May 24, 2021Updated 4 years ago
- Frack - Keep and Maintain your breach data☆386Sep 1, 2024Updated last year
- Vigilante.pw - The Breached Database Directory (BACKUP)☆21Jun 2, 2020Updated 5 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆23Jan 28, 2019Updated 7 years ago
- thelordseye searches and returns detailed information about devices that are directly connected to the internet [IoT] (Smart TV's, Fridge…☆78Oct 25, 2023Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 4 months ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks including stealer logs, credential dumps…☆49Feb 19, 2026Updated 3 months ago
- VMC: a Scalable, Open Source and Free Vulnerability Management Platform☆16Dec 22, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Links to various data breaches & data leaks☆52Apr 7, 2024Updated 2 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆107Jul 31, 2023Updated 2 years ago
- A GUI toolkit for Ndless-TI NSpire using SDL and Ndless libraries☆16Oct 11, 2021Updated 4 years ago
- OSINT tool that allows you to find a person's accounts and emails + breached emails☆653Apr 11, 2024Updated 2 years ago
- ☆18Jul 4, 2025Updated 10 months ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- Lab generation for final project in EC521. Used to teach students how to use some popular and powerful OSINT tools such as Maltego, h8mai…☆16Dec 14, 2019Updated 6 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆38Jul 8, 2020Updated 5 years ago
- Password Breach API Server☆89Jul 2, 2025Updated 10 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- OSINT Tool to find Breached Credit Cards Information☆611Nov 29, 2023Updated 2 years ago
- Cross Site Scripting Cheat sheet.☆12Apr 3, 2021Updated 5 years ago
- SMTP Open Relay Exploitation☆16Nov 23, 2020Updated 5 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Feb 4, 2018Updated 8 years ago
- Mass Windows credential stealer payload for the BashBunny☆14Nov 27, 2017Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆30Sep 28, 2015Updated 10 years ago
- This repo contain scripts written for finding subdomains using various available tools☆27Oct 21, 2020Updated 5 years ago
- Very strong ddos with proxy.☆114Nov 16, 2025Updated 6 months ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆93Apr 15, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- Tmux configuration, that supercharges your tmux to build cozy and cool terminal environment☆14Dec 24, 2019Updated 6 years ago
- Send a text message to people with no number!☆14Jan 17, 2022Updated 4 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,993Aug 15, 2023Updated 2 years ago