Categories |
|
---|---|
Website | haveibeenpwned.com |
Categories |
|
---|---|
Website | breachdirectory.org |
Took a while to find this site. Finally noticed google post saying domain changed. I'd say this is pretty much haveibeenpwned on steroids. (Which is a good thing) Really helps me in my day-to-day infosec and keeping my coworkers safe!
Based on our record, have i been pwned? seems to be a lot more popular than BreachDirectory.org. While we know about 3667 links to have i been pwned?, we've tracked only 14 mentions of BreachDirectory.org. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
This is a great site for checking current and monitoring future breaches: https://haveibeenpwned.com/. - Source: Hacker News / 20 days ago
I've been with AT&T since they merged with Cingular in 2006, and according to https://haveibeenpwned.com/ I'm not included in this dump. - Source: Hacker News / about 1 month ago
For about the last week I suddenly started getting bombarded with scam calls and emails. Pretty good sign that my info was recently leaked/ stolen from some website that has not yet disclosed. I checked https://haveibeenpwned.com but nothing new shows up. My phone number is only 2 years old so I know it isn’t from the previous incidents (looking at you hardware wallet Ledger!). Today I got another scam email but... - Source: Hacker News / about 1 month ago
Additionally, the library includes a list of known compromised passwords provided by the haveibeenpwned database service. This allows us to tell you directly if your password was seen earlier on a list of compromised passwords, immediately making it insecure no matter how complicated it is. - Source: dev.to / 2 months ago
FWIW they use haveibeenpwned.com to find the breaches when you enter the e-mail. So you could just go to https://haveibeenpwned.com to check if you are affected by any breaches. - Source: Hacker News / 2 months ago
Use snusbase but breachdirectory.org or search.illicit.services is completely free. Source: about 1 year ago
And another is breachdirectory which just searches for database breaches. In my opinion, it is even better than Snusbase and Dehashed, and gets the exact same stuff. Snusbase is $333+ and breachdirectory is none. You can get breachdirectory at https://breachdirectory.org/ for completely free. Source: about 1 year ago
Try https://breachdirectory.org/ to get some passwords, try a reverse email search at https://infotracer.com/email-lookup/ or https://thatsthem.com/ or you can just social engineer them. Also you can get their ip by this: https://www.youtube.com/watch?v=TB3OEG0bKwc . Hope this helps. Source: about 1 year ago
A good one is https://breachdirectory.org/. This allows you to get basically anyones breach data for completely free. It's basically like dehashed but better, and free. https://www.reddit.com/r/OSINT/comments/129yvnv/osint_sources_csint_sources_opsec_and_socmint/ There are also a lot of stuff like snusbase, dehashed etc on that post that I made. Source: about 1 year ago
Go to breach https://breachdirectory.org/ and enter your Gmail email address there to view where your email:pass was breached if you'd like to know where the leak came from. Source: about 1 year ago
bitwarden - Bitwarden is a free and open source password management solution for individuals, teams, and business organizations.
DeHashed - DeHashed is the largest & fastest data breach search engine.
Firefox Monitor - Firefox Monitor arms you with tools to keep your personal information safe.
LeakCheck - Data breach search engine, low price starting from $10/mo, one email address for free, unlimited API, 7B+ entries
Snusbase - The industry leading database lookup.
LeakCheck.cc - Website moved to https://checkleaked.cc Powered by Leakcheck.io. Protect your account, discover its leaks, avoid using insecure passwords. Secure your company and your person, know the passwords and information that hackers already have about you.