saladandonionrings / leakyLinks
Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dumps, and miscellaneous leak data — within a streamlined web interface powered by MongoDB.
☆45Updated 7 months ago
Alternatives and similar repositories for leaky
Users that are interested in leaky are comparing it to the libraries listed below
Sorting:
- Odinova Digital Tiger is an advanced application designed for Open-Source Intelligence (OSINT), equipped with versatile tools and a user-…☆85Updated 2 weeks ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆99Updated 2 years ago
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate a…☆54Updated 2 weeks ago
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- A repository with informtion related to Cloud Osint☆109Updated this week
- 🕵️ OSINT Tool (github tracker)☆163Updated last year
- All-sources tool to search websites by favicons☆184Updated last year
- A simple tool to check if an email is associated with an Instagram account. Useful for OSINT and verifying account existence. 🕵️♂️✨☆19Updated last year
- Chrome extension tool for OSINT & Recon☆57Updated last year
- Find Real IPs hidden behind Cloudflare with Criminal IP(criminalip.io), security OSINT Tool.☆121Updated last year
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆165Updated 3 weeks ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆108Updated 2 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆71Updated 7 months ago
- Python3 script to dump breach data from Dehashed☆40Updated 6 months ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆22Updated 3 years ago
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆77Updated 2 weeks ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆166Updated 10 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆119Updated 2 years ago
- PhantomCrawler is a Python-based web testing and research tool that simulates website interactions from multiple proxy IP addresses to an…☆74Updated 3 weeks ago
- ☆29Updated last year
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 3 months ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 9 months ago
- Helping you delete your old accounts☆86Updated 2 years ago
- A selection of useful Custom Serch Engines for OSINT.☆74Updated 3 weeks ago
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆66Updated 2 years ago
- Discovering Typo Squatting on your domains!☆80Updated last year
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆116Updated 8 months ago
- Strumenti utili per la ricerca di WebCam e Wifi di pubblico accesso - Useful tools for searching for public access webcams and Wi-Fi netw…☆110Updated last year