Credential Gathering

When you want to infiltrate an organization gaining some form of credentials will be key. One of the ways to gain these credentials is to search database and other form of leaks. A user might reuse his password on multiple accounts or use a specific pattern in their passwords.

External services

Service info
weleakinfo Data Breach Search Engine
scylla.sh db dumps and more (Search Engine)
hashes.org lookup hashes, leaks etc
OnlineHashCrack free online hash crack

Breaches/Leaks

Name Description Download URL
BreachCompilation 1.4 billion password breach compilation wordlist. Magnetlink
Name Description
h8mail Password Breach Hunting & Email OSINT tool, locally or using premium services. Supports chasing down related email.