Showing 11 open source projects for "data breach"

View related business solutions
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    pwnedOrNot

    pwnedOrNot

    Check breached emails and find exposed passwords from public dumps

    pwnedOrNot is an open source OSINT tool designed to investigate whether an email address has been compromised in known data breaches and to identify exposed credentials associated with that account. The tool works by interacting with the HaveIBeenPwned (HIBP) API to determine if a given email address appears in breach databases. If the email is found in a breach, the tool proceeds to search for associated passwords within publicly available data dumps. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 2
    WhatBreach

    WhatBreach

    OSINT tool for discovering email addresses in known data breaches

    ...If the breach databases are publicly available, the tool can attempt to download them for further analysis. It also supports deeper investigation of email domains and related profiles, making it useful for researchers, security analysts, and penetration testers conducting reconnaissance or breach analysis.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    GoSearch

    GoSearch

    OSINT tool to find usernames and digital footprints across 300+ sites

    ...The tool reduces false positives and false negatives by clearly marking uncertain matches, allowing users to quickly identify reliable results. In addition to username searches, GoSearch can check various breach intelligence databases for compromised credentials linked to a username. If password hashes are found in breach data, the tool can attempt to crack them using the Weakpass database.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 4
    Cr3dOv3r

    Cr3dOv3r

    Know the dangers of credential reuse attacks

    ...The system integrates with external APIs and services to gather breach data and perform automated checks efficiently. It supports multiple modes of operation, including leak-only analysis and credential testing workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    ClatScope

    ClatScope

    OSINT reconnaissance tool for IP, domain, email, and username lookups

    ...ClatScope supports dozens of OSINT operations, including domain analysis, breach checks, and account discovery.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 6
    truffleHog

    truffleHog

    Searches through git repositories for high entropy strings and secrets

    truffleHog searches through git repositories for high entropy strings and secrets, digging deep into commit history. TruffleHog runs behind the scenes to scan your environment for secrets like private keys and credentials, so you can protect your data before a breach occurs. Secrets can be found anywhere, so TruffleHog scans more than just code repositories, including SaaS and internally hosted software. With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Neon Wallet

    Neon Wallet

    Self-custodial wallet for managing digital assets

    Neon Wallet is a self-custodial wallet for managing digital assets on desktop and mobile, supporting Neo, Ethereum, and EVM networks, with full user control. Available as a desktop wallet on Windows, Mac OS X, and Linux, the NEON wallet allows users to claim GAS on the NEO network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SocialPwned

    SocialPwned

    OSINT tool to collect emails from social networks and find leaks

    ...It collects email addresses associated with individuals or organizations from platforms such as Instagram, LinkedIn, and Twitter. Once emails are discovered, SocialPwned searches for leaked credentials using breach databases like PwnDB and Dehashed to determine whether those accounts have appeared in data leaks. SocialPwned also integrates with GHunt to retrieve additional public information related to Google accounts linked to the discovered emails. By combining social media intelligence with breach data analysis, SocialPwned helps investigators identify reused passwords and patterns that may indicate potential security weaknesses.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    h8mail

    h8mail

    Email OSINT tool for finding breached credentials by email

    ...In addition to external services, it can integrate with premium APIs and data providers for more advanced breach intelligence capabilities. The tool is commonly used by penetration testers, OSINT investigators, and security researchers to detect compromised accounts and investigate credential leaks.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    Encryptron

    Encryptron

    An encryption software using C# 4.0

    First of all, let us understand the need for an encryption software. Just think of you sending a message of extreme confidentiality, someone else fetches it and goes through it. A breach in the security! We can’t allow that to happen. So, virtually every data send over a network is encrypted now-a-days. Let’s look at this now: Vdmbnld!`f`ho !Sdutsohof!whrhunsr!`oe!bnedsr-!une`x!H&l!fnhof!un!rinv!xnt!`o!houdsdruhof!unqhb!ui`u!hr-!inv!un!qsdq`sd!`o!dobsxquhno!rnguv`sd!trhof!B”!5/1!`oe!Vhoenvr!Gnslr/ Qsdsdpthrhudr!...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    Encrypt Flash Drive in Windows 10

    One-click to encrypt flash drive, USB drive and hard disk in Windows.

    ...It encrypts the entire USB drive, the encrypted files will be hidden, and you will only be able to access them if you run the encryption program in the encrypted flash drive and enter the correct password. In addition to the USB drive, this software can also secure other removable storage drives. From celebrities to an average person, data breach bugs everyone. With most of the software out there being too complex to use, we abstain from using them altogether. This flash drive encryption software boasts a friendly user interface, and you can easily use it to encrypt flash drive in Windows 10 without complicated steps. This software locks your storage device itself, creating an impenetrable barrier and denying unauthorized access, even if the device gets into the wrong hands.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB