Python3 script to dump breach data from Dehashed
☆42Jun 30, 2025Updated 8 months ago
Alternatives and similar repositories for DehashedDumper
Users that are interested in DehashedDumper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆37Jul 27, 2024Updated last year
- Links to various data breaches & data leaks☆44Apr 7, 2024Updated last year
- No-nonsense data breach search interface☆12Jul 20, 2024Updated last year
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆23Apr 29, 2022Updated 3 years ago
- You can use this tool to export your Telegram user, group, or chat history in JSON format, extract text messages, and it can help you ext…☆13May 22, 2025Updated 10 months ago
- Curated list of data leaks around the world☆80Jul 19, 2022Updated 3 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Feb 4, 2018Updated 8 years ago
- Username recon OSINT. Accurate hits! New sites to check, Simple and powerful tool. Goverments use this tool or similar tools built in dif…☆19Feb 19, 2026Updated last month
- BusyBox building with command ndk-build☆15Jun 18, 2024Updated last year
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- This Script will help you to gather information about your victim or friend☆15Jan 30, 2021Updated 5 years ago
- 📥 AI OSINT - Capture, download, and enjoy.☆34Sep 23, 2025Updated 6 months ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- Search breached data on private nodes, darkweb, internet, end-to-end channels☆137Nov 27, 2019Updated 6 years ago
- XSSMaze is a web service designed to test and improve the performance of security testing tools by providing various cases of XSS vulnera…☆31Mar 8, 2026Updated 2 weeks ago
- DepthSearch is a deep web OSINT tool that enables powerful, anonymous searches across deep web search engines. It features proxy support,…☆25Oct 26, 2024Updated last year
- Path to a free self-taught education in Information Security!☆14Aug 27, 2022Updated 3 years ago
- Torrent files for data breaches used in research☆177Dec 20, 2021Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- ☆20Sep 17, 2024Updated last year
- Frack - Keep and Maintain your breach data☆385Sep 1, 2024Updated last year
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- ☆15Jun 17, 2016Updated 9 years ago
- pentester payload ,info hunte☆10Apr 4, 2022Updated 3 years ago
- osint tool user github | ghubscan 1.4☆13Mar 5, 2026Updated 2 weeks ago
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆188Oct 17, 2024Updated last year
- Download Free Databreaches☆315Sep 17, 2024Updated last year
- A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search qu…☆32Mar 4, 2026Updated 3 weeks ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- All combinations of various characters, to get the desired word☆21Dec 13, 2023Updated 2 years ago
- ☆19May 1, 2025Updated 10 months ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆65May 13, 2021Updated 4 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆19Mar 1, 2023Updated 3 years ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks including stealer logs, credential dumps…☆48Feb 19, 2026Updated last month
- Password leak analysis program☆16Oct 1, 2022Updated 3 years ago
- Small project to facilitate creation of .lnk payloads☆81Nov 18, 2022Updated 3 years ago
- Building Modern Data Applications Using Databricks Lakehouse, published by Packt☆24Nov 13, 2024Updated last year