notdls / known-breachesLinks
Daily updates from leaked data search engines, aggregators and similar services.
☆121Updated this week
Alternatives and similar repositories for known-breaches
Users that are interested in known-breaches are comparing it to the libraries listed below
Sorting:
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated last month
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Ransomware groups posts☆42Updated this week
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆53Updated last year
- AI-Powered Dark Web OSINT Tool☆130Updated last month
- Collection of videos of Raids on Cybercriminals☆20Updated 7 months ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Sniffing out well-known threat groups☆63Updated last year
- A repository with informtion related to Cloud Osint☆108Updated 6 months ago
- Tor onion address lookup☆55Updated 2 months ago
- Maltego transformation for TON investigations☆24Updated last year
- A selection of useful Custom Serch Engines for OSINT.☆71Updated 2 months ago
- ☆149Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- URL fingerprinting made easy☆89Updated last year
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate a…☆52Updated 3 months ago
- All-sources tool to search websites by favicons☆175Updated 11 months ago
- Maltego Transforms for WhatsMyName☆67Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- Python3 script to dump breach data from Dehashed☆35Updated 4 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆36Updated 10 months ago
- ☆28Updated 10 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- A Linkedin Activity date Finder☆64Updated 6 months ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆93Updated 2 years ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated last year
- OSINT tool to extract email addresses and other useful info from various GitHub sources.☆48Updated 2 months ago
- ☆55Updated 9 months ago