saladandonionrings / leakyView external linksLinks
Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dumps, and miscellaneous leak data — within a streamlined web interface powered by MongoDB.
☆47Jun 6, 2025Updated 8 months ago
Alternatives and similar repositories for leaky
Users that are interested in leaky are comparing it to the libraries listed below
Sorting:
- good looking dashboard to query your infostealer logs☆21Jan 16, 2026Updated 3 weeks ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆23Apr 29, 2022Updated 3 years ago
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- VM for OSINT investigators that is a test-bed for using AI tools and agents to improve investigations. No out-of-date and unmaintained t…☆17May 2, 2025Updated 9 months ago
- Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection☆18Aug 18, 2021Updated 4 years ago
- 🗄️💧 Find exposed and unsecured databases from a list of hosts. 🗄️💧☆15Jul 1, 2021Updated 4 years ago
- This is a selection of ethical hacking courses on video☆23Mar 23, 2022Updated 3 years ago
- A simple tool to check if an email is associated with an Instagram account. Useful for OSINT and verifying account existence. 🕵️♂️✨☆20Oct 20, 2024Updated last year
- Automate Nuclei scans and streamline bug hunting workflows☆21Feb 16, 2024Updated last year
- Full Camect Hub integration for Home Assistant / HACS☆13Jan 15, 2025Updated last year
- Useful OSINT tools☆38Apr 26, 2024Updated last year
- Search breached data on private nodes, darkweb, internet, end-to-end channels☆134Nov 27, 2019Updated 6 years ago
- This repository serves as a comprehensive catalog for tools and websites useful in Open Source Intelligence (OSINT) investigations.☆44May 11, 2025Updated 9 months ago
- ☆143Mar 26, 2024Updated last year
- Fabric Stain Detection System based on YOLO algorithm☆19Jan 28, 2025Updated last year
- 📥 AI OSINT - Capture, download, and enjoy.☆34Sep 23, 2025Updated 4 months ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year
- ☆10Feb 5, 2026Updated last week
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- Tool to build and export timelines☆34Aug 24, 2024Updated last year
- A tool for extracting and filtering URLs, IPs, domains, and subdomains from text or web pages, with built-in web scraping capabilities.☆14Mar 10, 2025Updated 11 months ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- Repository containing machine solving attempts and results generated by BoxPwnr☆15Updated this week
- ☆10Jul 30, 2024Updated last year
- Python3 script to dump breach data from Dehashed☆42Jun 30, 2025Updated 7 months ago
- Integrates Ganache and Harmony in a seamless setup☆10Sep 12, 2021Updated 4 years ago
- BpArsenal, a Burp Suite plugin that can quickly convert http requests into command-line tool execution, launch third-party tools and open…☆22Oct 31, 2025Updated 3 months ago
- simple vanilla javascript datatable for Boostrap V5☆11Feb 7, 2026Updated last week
- A basic implementation of a (test) pattern generator from the HDMI output of an raspberry pi.☆12May 7, 2024Updated last year
- react project to book seats☆10Oct 12, 2017Updated 8 years ago
- Open Data and sources for OSINT in Tajikistan☆13Jan 17, 2025Updated last year
- AES Crypt for Windows is powerful file encryption software that integrates seamlessly with the Windows desktop and includes the AES Crypt…☆15Feb 7, 2026Updated last week
- A Repository for Miscellaneous Scripts☆11Jul 18, 2014Updated 11 years ago
- A PHP script to automatically like post in instagram timeline☆10May 5, 2021Updated 4 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- A database for storing, querying and doing stats on credential leaks☆39May 23, 2023Updated 2 years ago
- 🔥🔥🔥 AI security automation platform. Build visual workflows, deploy autonomous agents, and automate threat detection and response. 80+…☆27Updated this week
- Uzbek cyrillic/latin alphabetic, upper/lower/capital-case, name/surname/patronymic wordlists (dictionaries) and their combinations☆11Aug 4, 2022Updated 3 years ago