Daily updates from leaked data search engines, aggregators and similar services.
☆148Mar 5, 2026Updated this week
Alternatives and similar repositories for known-breaches
Users that are interested in known-breaches are comparing it to the libraries listed below
Sorting:
- OSINT oriented Web Browser☆15Feb 22, 2026Updated last week
- Vigilante.pw - The Breached Database Directory (BACKUP)☆20Jun 2, 2020Updated 5 years ago
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate a…☆63Jan 11, 2026Updated last month
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆27Jul 11, 2025Updated 7 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127May 28, 2024Updated last year
- FEAT, short for Factcheck Explorer Analysis Tool, is designed to facilitate the exploration, analysis, and visualization of fact-checking…☆31Apr 11, 2024Updated last year
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- Python3 script to dump breach data from Dehashed☆42Jun 30, 2025Updated 8 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Feb 24, 2026Updated last week
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Web application designed to raise user awareness and fortify online identities against tracking techniques.☆39Jan 29, 2025Updated last year
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆22Feb 27, 2026Updated last week
- A tool for extract Endpoints, URLs and Secrets from contents☆67Feb 2, 2026Updated last month
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆34May 21, 2024Updated last year
- A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes☆75Apr 14, 2025Updated 10 months ago
- Reaper of screencast videos for OSINT purposes☆20Apr 12, 2024Updated last year
- Links to various data breaches & data leaks☆42Apr 7, 2024Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆59Sep 18, 2025Updated 5 months ago
- Collection of all previous 1337UP CTF challenges.☆78Jan 6, 2025Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- One Conference 2024☆111Oct 1, 2024Updated last year
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Jul 8, 2024Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- A Malware Scarecrow for Windows 10/11 with a user-friendly touch.☆70Oct 30, 2024Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- ☆27May 6, 2024Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- Tool for searching information via Telegram, Number Phone and Username.☆32Apr 30, 2025Updated 10 months ago
- spk aka spritzgebaeck: A small OSINT/Recon tool to find CIDRs that belong to a specific organization.☆85Jan 12, 2026Updated last month
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆137May 7, 2025Updated 9 months ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆55Feb 26, 2026Updated last week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆288May 16, 2025Updated 9 months ago