Leakedsource like "Data Breach Search Engine" with cool Material UI
☆23Jan 28, 2019Updated 7 years ago
Alternatives and similar repositories for dataleaks
Users that are interested in dataleaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python3 script to dump breach data from Dehashed☆43Jun 30, 2025Updated 9 months ago
- Vigilante.pw - The Breached Database Directory (BACKUP)☆21Jun 2, 2020Updated 5 years ago
- ⚖️ R code to scrape the DoJ Capitol Breach Cases and daily data files of said scraped info via GH actions☆24Nov 6, 2024Updated last year
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆193Oct 29, 2019Updated 6 years ago
- Catalog of security breaches☆24Mar 15, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- ☆21Oct 3, 2021Updated 4 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- 破解CS4.0☆16Feb 14, 2022Updated 4 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆13Nov 17, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- Very Easy Relative Backdoor Application☆14Jun 8, 2021Updated 4 years ago
- ☆16Sep 9, 2021Updated 4 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- For importing, searching, and managing public password breach data☆160Nov 1, 2023Updated 2 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- CVE-2021-22005批量验证python脚本☆13Sep 25, 2021Updated 4 years ago
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- A tool to harvest credentials from leaked data dump☆86Dec 7, 2021Updated 4 years ago
- CVE-2022-22963 Spring-Cloud-Function-SpEL_RCE_exploit☆15Mar 30, 2022Updated 4 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Anonymously check if an email sender has ever been compromised in a security breach. Service provided by https://hacked-emails.com/☆14Apr 13, 2018Updated 8 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Reset Excel sheet and workbook protection☆10Jun 23, 2019Updated 6 years ago
- cobaltstrike4.5版本破解、去除checksum8特征、bypass BeaconEye、修复错误路径泄漏stage、增加totp双因子验证、修复CVE-2022-39197等☆18Sep 26, 2022Updated 3 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- Load the evilDLL from socket connection without touch disk☆15Aug 27, 2021Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- A CRT pixelation effect for backgrounds and decyphering animation.☆10Oct 9, 2025Updated 6 months ago
- 在科研(摸鱼)过程中,收集到的或者自己写的一些有用的(经过实战检验的)exp/poc,欢迎提交issue和PR☆16Oct 15, 2021Updated 4 years ago