Credential Gathering
When you want to infiltrate an organization gaining some form of credentials will be key. One of the ways to gain these credentials is to search database and other form of leaks. A user might reuse his password on multiple accounts or use a specific pattern in their passwords.
External services
Breaches/Leaks
Name |
Description |
Download URL |
BreachCompilation |
1.4 billion password breach compilation wordlist. |
Magnetlink |
Related pages
Name |
Description |
h8mail |
Password Breach Hunting & Email OSINT tool, locally or using premium services. Supports chasing down related email. |