Leakedsource like "Data Breach Search Engine" with cool Material UI
☆193Oct 29, 2019Updated 6 years ago
Alternatives and similar repositories for dataleaks
Users that are interested in dataleaks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search breached data on private nodes, darkweb, internet, end-to-end channels☆142Nov 27, 2019Updated 6 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆23Jan 28, 2019Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated 4 months ago
- A tool to harvest credentials from leaked data dump☆86Dec 7, 2021Updated 4 years ago
- Frack - Keep and Maintain your breach data☆386Sep 1, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- A data breach parser written in python☆22Aug 21, 2019Updated 6 years ago
- For importing, searching, and managing public password breach data☆160Nov 1, 2023Updated 2 years ago
- Random perl scripts from 2007 that may be usefull☆15Nov 21, 2015Updated 10 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- A meta-database collecting resources that compile lists of breaches☆22Oct 30, 2025Updated 6 months ago
- Python3 script to dump breach data from Dehashed☆43Jun 30, 2025Updated 10 months ago
- An OSINT tool to find data leaks on a targeted website☆18Mar 30, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- sap netweaver 0day poc by shinyhunters (scattered lapsus$ hunters) affecting all 7.x CVE-2025-31324☆22Aug 15, 2025Updated 9 months ago
- ☆16Sep 9, 2021Updated 4 years ago
- Torrent files for data breaches used in research☆182Dec 20, 2021Updated 4 years ago
- Scans plugins directory for possible vulnerable plugins.☆22Dec 9, 2023Updated 2 years ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆12Feb 14, 2023Updated 3 years ago
- ADBSploit - A tool for Android device exploitation and management via ADB. Connects via USB/IP, controls apps/media/files, and supports F…☆14Apr 5, 2025Updated last year
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- David Lin's Windows 10 Cheatsheet☆11Mar 5, 2024Updated 2 years ago
- combo lists for dev testing☆11Jan 15, 2019Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Source code of WeLeakInfo.☆10Jul 31, 2020Updated 5 years ago
- Vigilante.pw - The Breached Database Directory (BACKUP)☆21Jun 2, 2020Updated 5 years ago
- 在科研(摸鱼)过程中,收集到的或者自己写的一些有用的(经过实战检验的)exp/poc,欢迎提交issue和PR☆16Oct 15, 2021Updated 4 years ago
- Catalog of security breaches☆24Mar 15, 2025Updated last year
- Password Breach API Server☆89Jul 2, 2025Updated 10 months ago
- Companion Worm research☆17Nov 8, 2021Updated 4 years ago
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆316Dec 8, 2022Updated 3 years ago
- OSINT tool to find breached emails, databases, pastes, and relevant information☆1,574Aug 14, 2025Updated 9 months ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Hacker101 is a free class for web security. Whether you're a programmer with an interest in bug bounties or a seasoned security professio…☆11Jun 25, 2018Updated 7 years ago
- Layer 4 & 7 real time traffic.☆16Nov 4, 2020Updated 5 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Tool to parse Stealer Logs.☆20Aug 2, 2023Updated 2 years ago
- The script uses an Google maps API to download photos of places in the area specified by coordinates and search radius☆19Oct 16, 2023Updated 2 years ago
- ☆1,034Aug 4, 2024Updated last year
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago