jeisonbeast / dataleaksLinks
Leakedsource like "Data Breach Search Engine" with cool Material UI
☆22Updated 7 years ago
Alternatives and similar repositories for dataleaks
Users that are interested in dataleaks are comparing it to the libraries listed below
Sorting:
- Python3 script to dump breach data from Dehashed☆42Updated 7 months ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Updated 7 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Updated 4 years ago
- A data breach parser written in python☆22Updated 6 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Updated 4 years ago
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆36Updated 5 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- Determine if an email address exists or not on ProtonMail with NeutrOSINT☆34Updated last month
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Updated 3 years ago
- 🧬 Extract and analyze contributors info from git repos☆83Updated 2 years ago
- Quidam maltego transform☆42Updated 5 years ago
- ☆72Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Updated 8 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆45Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆14Updated 6 years ago
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆45Updated 5 years ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆38Updated 9 months ago
- Rockyou for web fuzzing☆15Updated 4 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆30Updated 6 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆24Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- Customized Password/Passphrase List inputting Target Info☆96Updated last year
- a shell script aim to automatically launch 50+ online web scanning tools in the Browsaer against a target domain in a 10 waves☆66Updated 6 years ago
- Collect information about leaks for particular domain in IntelX and present it on a tree view graph.☆29Updated 4 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- A template-based tool for quickly constructing and running advanced Boolean searches on Google and Twitter/X for person-based OSINT inves…☆17Updated last year