Frack - Keep and Maintain your breach data
☆385Sep 1, 2024Updated last year
Alternatives and similar repositories for Frack
Users that are interested in Frack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆193Oct 29, 2019Updated 6 years ago
- Search breached data on private nodes, darkweb, internet, end-to-end channels☆140Nov 27, 2019Updated 6 years ago
- Torrent files for data breaches used in research☆180Dec 20, 2021Updated 4 years ago
- For importing, searching, and managing public password breach data☆160Nov 1, 2023Updated 2 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆23Apr 29, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- No-nonsense data breach search interface☆12Jul 20, 2024Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆65May 13, 2021Updated 4 years ago
- Python3 script to dump breach data from Dehashed☆43Jun 30, 2025Updated 9 months ago
- A database for storing, querying and doing stats on credential leaks☆40May 23, 2023Updated 2 years ago
- ☆1,030Aug 4, 2024Updated last year
- Script to perform some hashcracking logic automagically☆82Nov 12, 2025Updated 5 months ago
- A list of tools that handle different data and make it usable in Maltego.☆267Nov 9, 2024Updated last year
- Password Breach API Server☆88Jul 2, 2025Updated 9 months ago
- A tool to harvest credentials from leaked data dump☆86Dec 7, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,950Aug 15, 2023Updated 2 years ago
- Generate graphs and charts based on password cracking result☆164Feb 17, 2023Updated 3 years ago
- Parser for data dumps Collection #1 / Collection #2-5☆153Feb 22, 2019Updated 7 years ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Oct 30, 2021Updated 4 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 5 years ago
- A data breach parser written in python☆22Aug 21, 2019Updated 6 years ago
- LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to he…☆447Jan 21, 2019Updated 7 years ago
- 🗄️💧 Find exposed and unsecured databases from a list of hosts. 🗄️💧☆15Jul 1, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Dec 19, 2023Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,783Updated this week
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- Repository for the LinkScope Client software.☆460Mar 4, 2025Updated last year
- Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute f…☆232Apr 4, 2023Updated 3 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Links to various data breaches & data leaks☆50Apr 7, 2024Updated 2 years ago
- Refactored & improved CredKing password spraying tool, uses FireProx APIs to rotate IP addresses, stay anonymous, and beat throttling☆1,265Mar 19, 2025Updated last year
- ☆16Dec 7, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- Exchangelib wrapper for pentesting☆67Feb 17, 2025Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆745Aug 18, 2023Updated 2 years ago
- Poastal - the Email OSINT tool☆596Apr 8, 2024Updated 2 years ago
- Facial Recognition and its dangers for Special Forces Operatives☆21Oct 6, 2023Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆742May 19, 2023Updated 2 years ago