Find open databases - Powered by Binaryedge.io
☆1,428Jun 28, 2020Updated 5 years ago
Alternatives and similar repositories for LeakLooker
Users that are interested in LeakLooker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆312Dec 8, 2022Updated 3 years ago
- Crawler (Bot) searching for credential leaks on paste sites.☆765Mar 31, 2022Updated 3 years ago
- OSINT tool to find breached emails, databases, pastes, and relevant information☆1,532Aug 14, 2025Updated 7 months ago
- Search for leaked credentials☆1,383Apr 27, 2021Updated 4 years ago
- An advanced tool for email reconnaissance☆1,287Mar 26, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Build interactive map of cameras from Shodan☆1,265Jun 28, 2020Updated 5 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆696May 16, 2020Updated 5 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email☆4,936Aug 15, 2023Updated 2 years ago
- ☆275Feb 20, 2021Updated 5 years ago
- A Modern Orchestration Engine for Security☆6,155Mar 13, 2026Updated 2 weeks ago
- ☆200Jun 6, 2019Updated 6 years ago
- Collection of Scripts for shodan searching stuff.☆1,140Jan 14, 2026Updated 2 months ago
- A Tool for Domain Flyovers☆5,916May 22, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A simple SSRF-testing sheriff written in Go☆336Oct 31, 2024Updated last year
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆680Oct 28, 2023Updated 2 years ago
- Scan for misconfigured S3 buckets across S3-compatible APIs!☆3,031Dec 11, 2025Updated 3 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆534Mar 7, 2022Updated 4 years ago
- Mass scan IPs for vulnerable services☆1,047Feb 17, 2022Updated 4 years ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,947Feb 28, 2025Updated last year
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,553Mar 7, 2024Updated 2 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆832May 22, 2023Updated 2 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Multi Tool Subdomain Enumeration☆723Apr 11, 2021Updated 4 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Oct 21, 2022Updated 3 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,242Nov 20, 2025Updated 4 months ago
- The fastest and complete solution for domain recognition. Supports screenshoting, port scan, HTTP check, data import from other tools, su…☆3,708Mar 21, 2026Updated last week
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,790Apr 26, 2024Updated last year
- This tool can be used to brute discover GET and POST parameters☆1,396Aug 24, 2019Updated 6 years ago
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 3 months ago
- Striker is an offensive information and vulnerability scanner.☆2,322Jun 4, 2023Updated 2 years ago
- Find web directories without bruteforce☆1,984Oct 29, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,124Aug 14, 2024Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,306May 8, 2025Updated 10 months ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,252Jun 10, 2025Updated 9 months ago
- Reconnaissance Swiss Army Knife☆2,023Jan 26, 2021Updated 5 years ago
- Find leaked secrets via github search☆3,154Oct 5, 2025Updated 5 months ago
- Attack Surface Management Platform☆9,622Feb 15, 2026Updated last month
- Security Tool to Look For Interesting Files in S3 Buckets☆1,459Apr 10, 2024Updated last year