notdls / known-breaches
Daily updates from leaked data search engines, aggregators and similar services.
☆94Updated this week
Alternatives and similar repositories for known-breaches:
Users that are interested in known-breaches are comparing it to the libraries listed below
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆43Updated last year
- Collection of videos of Raids on Cybercriminals☆19Updated this week
- Tor onion address lookup☆38Updated last month
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 4 months ago
- Sniffing out well-known threat groups☆28Updated 7 months ago
- Ransomware groups posts☆37Updated this week
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated 2 weeks ago
- ☆52Updated 2 months ago
- Capture screenshots of onion services on an onion service.☆48Updated 9 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 3 months ago
- A selection of useful Custom Serch Engines for OSINT.☆60Updated 2 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated 11 months ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆50Updated 2 weeks ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆72Updated this week
- URL fingerprinting made easy☆85Updated 11 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- A Linkedin Activity date Finder☆28Updated this week
- ☆77Updated 11 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 8 months ago
- Maltego transformation for TON investigations☆25Updated last year
- The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware …☆18Updated 4 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 5 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆48Updated last year
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆45Updated 2 months ago