notdls / known-breachesView external linksLinks
Daily updates from leaked data search engines, aggregators and similar services.
☆146Feb 6, 2026Updated last week
Alternatives and similar repositories for known-breaches
Users that are interested in known-breaches are comparing it to the libraries listed below
Sorting:
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate a…☆60Jan 11, 2026Updated last month
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆26Jul 11, 2025Updated 7 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆128May 28, 2024Updated last year
- FEAT, short for Factcheck Explorer Analysis Tool, is designed to facilitate the exploration, analysis, and visualization of fact-checking…☆31Apr 11, 2024Updated last year
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- Python3 script to dump breach data from Dehashed☆42Jun 30, 2025Updated 7 months ago
- ☆18Jul 30, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Dec 12, 2023Updated 2 years ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Updated this week
- Provides an overview of the inner file structure of a PDF☆25Sep 26, 2022Updated 3 years ago
- Web application designed to raise user awareness and fortify online identities against tracking techniques.☆39Jan 29, 2025Updated last year
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆22Feb 6, 2026Updated last week
- A tool for extract Endpoints, URLs and Secrets from contents☆68Feb 2, 2026Updated last week
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection☆34May 21, 2024Updated last year
- Autonomous AI C2☆33Jul 23, 2024Updated last year
- Reaper of screencast videos for OSINT purposes☆20Apr 12, 2024Updated last year
- Links to various data breaches & data leaks☆40Apr 7, 2024Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Sep 18, 2025Updated 4 months ago
- Collection of all previous 1337UP CTF challenges.☆79Jan 6, 2025Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- One Conference 2024☆111Oct 1, 2024Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- ☆26May 6, 2024Updated last year
- A Malware Scarecrow for Windows 10/11 with a user-friendly touch.☆69Oct 30, 2024Updated last year
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated last month
- Tool for searching information via Telegram, Number Phone and Username.☆29Apr 30, 2025Updated 9 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆54Feb 3, 2026Updated last week
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆134May 7, 2025Updated 9 months ago
- A list of transforms for searching Red, Yellow, and UNSC notices by Name or Phrase.☆25Jun 15, 2023Updated 2 years ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- A tool used to do reverse video searches.☆10Nov 30, 2024Updated last year
- Mixnet Messaging App☆11Oct 3, 2025Updated 4 months ago
- Search for sensitive data in Postman public library.☆214Aug 28, 2025Updated 5 months ago