notdls / known-breaches
Daily updates from leaked data search engines, aggregators and similar services.
☆94Updated this week
Alternatives and similar repositories for known-breaches:
Users that are interested in known-breaches are comparing it to the libraries listed below
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆38Updated 11 months ago
- Collection of videos of Raids on Cybercriminals☆18Updated 4 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆41Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 2 months ago
- Ransomware groups posts☆37Updated this week
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆88Updated 10 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆46Updated this week
- A curated list of awesome resources related to enhancing your enterprise Email Security☆39Updated 7 months ago
- Protection against HTML smuggling attempts.☆87Updated this week
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆12Updated 5 months ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆36Updated last week
- All-sources tool to search websites by favicons☆118Updated 3 months ago
- God Mode Detection Rules☆134Updated 6 months ago
- Examine Chrome extensions for security issues☆74Updated this week
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 4 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- A selection of useful Custom Serch Engines for OSINT.☆59Updated 3 weeks ago
- Hijack a slack bot to phish your way in☆48Updated last month
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year
- Data from Dark Web Marketplace scraping - Be careful☆38Updated 3 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆34Updated this week
- Sniffing out well-known threat groups☆28Updated 6 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆113Updated last year
- Maltego transformation for TON investigations☆24Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated 2 months ago
- Capture screenshots of onion services on an onion service.☆50Updated 8 months ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 6 months ago
- Repository of tools and resources for analyzing Docker containers☆62Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆88Updated this week