Credential Gathering
When you want to infiltrate an organization gaining some form of credentials will be key. One of the ways to gain these credentials is to search database and other form of leaks. A user might reuse his password on multiple accounts or use a specific pattern in their passwords.
External services
Breaches/Leaks
| Name | 
Description | 
Download URL | 
| BreachCompilation | 
1.4 billion password breach compilation wordlist. | 
Magnetlink | 
Related pages
  
    
      
        | Name | 
        Description | 
      
    
    
        
          
        
          
        
          
        
          
        
          
        
          
        
          
        
          
        
          
            
              
                
                  |  h8mail  | 
                  Password Breach Hunting & Email OSINT tool, locally or using premium services. Supports chasing down related email. |