woj-ciech / LeakLooker
Find open databases - Powered by Binaryedge.io
☆1,347Updated 4 years ago
Alternatives and similar repositories for LeakLooker
Users that are interested in LeakLooker are comparing it to the libraries listed below
Sorting:
- Crawler (Bot) searching for credential leaks on paste sites.☆671Updated 3 years ago
- OSINT tool to find breached emails, databases, pastes, and relevant information☆1,278Updated 6 months ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,617Updated 5 months ago
- 🔎 shodansploit > v1.3.0☆533Updated 2 years ago
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,357Updated last year
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,504Updated last year
- Collection of Scripts for shodan searching stuff.☆1,101Updated 5 months ago
- Mass scan IPs for vulnerable services☆1,032Updated 3 years ago
- Search for leaked credentials☆1,332Updated 4 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,209Updated 6 years ago
- Reconnaissance Swiss Army Knife☆1,907Updated 4 years ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,121Updated 2 years ago
- Scanning pastebin with yara rules☆1,088Updated 10 months ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,255Updated 10 months ago
- IP lookup by favicon using Shodan☆1,164Updated 3 months ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,094Updated 9 months ago
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆291Updated 2 years ago
- Striker is an offensive information and vulnerability scanner.☆2,279Updated last year
- Subdomain enumeration and information gathering tool☆1,291Updated last month
- Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Googl…☆1,568Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,710Updated 7 months ago
- A python based LinkedIn enumeration tool☆557Updated last year
- Advanced reconnaissance utility☆974Updated last year
- Automatically Launch Google Hacking Queries Against A Target Domain☆725Updated last year
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆680Updated 5 years ago
- The Offensive Manual Web Application Penetration Testing Framework.☆1,818Updated 2 years ago
- An advanced tool for email reconnaissance☆1,060Updated 5 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆632Updated 2 years ago
- Command-line tool to scan Google search results for vulnerabilities☆523Updated 2 weeks ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,655Updated 5 months ago