Find open databases - Powered by Binaryedge.io
☆1,435Jun 28, 2020Updated 5 years ago
Alternatives and similar repositories for LeakLooker
Users that are interested in LeakLooker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆314Dec 8, 2022Updated 3 years ago
- Crawler (Bot) searching for credential leaks on paste sites.☆773Mar 31, 2022Updated 4 years ago
- OSINT tool to find breached emails, databases, pastes, and relevant information☆1,546Aug 14, 2025Updated 8 months ago
- Search for leaked credentials☆1,384Apr 27, 2021Updated 4 years ago
- An advanced tool for email reconnaissance☆1,291Mar 26, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Build interactive map of cameras from Shodan☆1,264Jun 28, 2020Updated 5 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆697May 16, 2020Updated 5 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,950Aug 15, 2023Updated 2 years ago
- ☆276Feb 20, 2021Updated 5 years ago
- A Modern Orchestration Engine for Security☆6,193Apr 6, 2026Updated last week
- ☆200Jun 6, 2019Updated 6 years ago
- Collection of Scripts for shodan searching stuff.☆1,141Jan 14, 2026Updated 3 months ago
- A Tool for Domain Flyovers☆5,923May 22, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A simple SSRF-testing sheriff written in Go☆337Oct 31, 2024Updated last year
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆3,050Dec 11, 2025Updated 4 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆535Mar 7, 2022Updated 4 years ago
- Mass scan IPs for vulnerable services☆1,048Feb 17, 2022Updated 4 years ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,954Feb 28, 2025Updated last year
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,555Mar 7, 2024Updated 2 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆835May 22, 2023Updated 2 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Multi Tool Subdomain Enumeration☆723Apr 11, 2021Updated 5 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Oct 21, 2022Updated 3 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,271Nov 20, 2025Updated 4 months ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,720Updated this week
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,795Apr 26, 2024Updated last year
- This tool can be used to brute discover GET and POST parameters☆1,393Aug 24, 2019Updated 6 years ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 4 months ago
- Striker is an offensive information and vulnerability scanner.☆2,327Jun 4, 2023Updated 2 years ago
- Find web directories without bruteforce☆1,987Oct 29, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,153Aug 14, 2024Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,313May 8, 2025Updated 11 months ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,259Mar 26, 2026Updated 3 weeks ago
- Reconnaissance Swiss Army Knife☆2,033Jan 26, 2021Updated 5 years ago
- Find leaked secrets via github search☆3,184Oct 5, 2025Updated 6 months ago
- Security Tool to Look For Interesting Files in S3 Buckets☆1,459Apr 10, 2024Updated 2 years ago
- Attack Surface Management Platform☆9,673Feb 15, 2026Updated 2 months ago