Frack - Keep and Maintain your breach data
☆385Sep 1, 2024Updated last year
Alternatives and similar repositories for Frack
Users that are interested in Frack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Search breached data on private nodes, darkweb, internet, end-to-end channels☆136Nov 27, 2019Updated 6 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆194Oct 29, 2019Updated 6 years ago
- Torrent files for data breaches used in research☆177Dec 20, 2021Updated 4 years ago
- For importing, searching, and managing public password breach data☆160Nov 1, 2023Updated 2 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆23Apr 29, 2022Updated 3 years ago
- No-nonsense data breach search interface☆12Jul 20, 2024Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆65May 13, 2021Updated 4 years ago
- Python3 script to dump breach data from Dehashed☆42Jun 30, 2025Updated 8 months ago
- A database for storing, querying and doing stats on credential leaks☆40May 23, 2023Updated 2 years ago
- ☆1,028Aug 4, 2024Updated last year
- Script to perform some hashcracking logic automagically☆81Nov 12, 2025Updated 4 months ago
- A list of tools that handle different data and make it usable in Maltego.☆265Nov 9, 2024Updated last year
- Password Breach API Server☆88Jul 2, 2025Updated 8 months ago
- A tool to harvest credentials from leaked data dump☆85Dec 7, 2021Updated 4 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,928Aug 15, 2023Updated 2 years ago
- Generate graphs and charts based on password cracking result☆163Feb 17, 2023Updated 3 years ago
- Parser for data dumps Collection #1 / Collection #2-5☆153Feb 22, 2019Updated 7 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 4 years ago
- A data breach parser written in python☆22Aug 21, 2019Updated 6 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to he…☆444Jan 21, 2019Updated 7 years ago
- 🗄️💧 Find exposed and unsecured databases from a list of hosts. 🗄️💧☆15Jul 1, 2021Updated 4 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆191Dec 19, 2023Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,698Updated this week
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- Repository for the LinkScope Client software.☆458Mar 4, 2025Updated last year
- Links to various data breaches & data leaks☆44Apr 7, 2024Updated last year
- Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute f…☆233Apr 4, 2023Updated 2 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,260Mar 19, 2025Updated last year
- ☆16Dec 7, 2025Updated 3 months ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- Exchangelib wrapper for pentesting☆67Feb 17, 2025Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- Poastal - the Email OSINT tool☆590Apr 8, 2024Updated last year
- Facial Recognition and its dangers for Special Forces Operatives☆21Oct 6, 2023Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆741May 19, 2023Updated 2 years ago