xakepnz / BLUELAYView external linksLinks
Searches online paste sites for certain search terms which can indicate a possible data breach.
☆75Oct 30, 2021Updated 4 years ago
Alternatives and similar repositories for BLUELAY
Users that are interested in BLUELAY are comparing it to the libraries listed below
Sorting:
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 5 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- Search breached data on private nodes, darkweb, internet, end-to-end channels☆134Nov 27, 2019Updated 6 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- Passive subdomains and web directories recon using Bing.☆13Apr 30, 2018Updated 7 years ago
- InfiniteWP Client < 1.9.4.5 - Authentication Bypass☆21Jul 28, 2021Updated 4 years ago
- A program to check the security of personal passwords.☆12Jul 19, 2022Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆41Apr 9, 2022Updated 3 years ago
- a personal leaks database to improve combolists and for more effective pentests☆25Sep 4, 2023Updated 2 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆22Jan 28, 2019Updated 7 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- Fraud prevention tool☆28Aug 9, 2020Updated 5 years ago
- Code to check AWS S3 buckets☆17Dec 19, 2017Updated 8 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆193Oct 29, 2019Updated 6 years ago
- A tool to spider Github or search URLs for various information leaks☆34May 22, 2023Updated 2 years ago
- Modified version of breach-parse that parses through breached databases to output emails, usernames, and passwords to be imported into co…☆23Apr 29, 2022Updated 3 years ago
- Detect leaks in security event logs.☆20Apr 9, 2019Updated 6 years ago
- 个壬数扌居捡漏网站,适用于 尻尻 / 京東 / 庆丰哦不顺丰 / 维傅☆19Dec 1, 2020Updated 5 years ago
- Catalog of security breaches☆24Mar 15, 2025Updated 11 months ago
- Simple shell script for automated domain recognition with some tools☆20Mar 9, 2019Updated 6 years ago
- PoC List☆10Sep 4, 2022Updated 3 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 3 months ago
- SOCMINT tool to find social media accounts.☆31Sep 12, 2024Updated last year
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- Query Shodan and Censys data for fast parsing☆39Aug 7, 2018Updated 7 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- Tailscale System(d) (bootable) container for use with Podman Machine, Podman Desktop, MicroShift and OpenShift Local installations☆12Dec 30, 2024Updated last year
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- Maltego transformation for TON investigations☆24Jan 1, 2024Updated 2 years ago