Red Squad
BuyMeACoffee
  • 🏠/home/red-squad
    • ⏰Recently Added
    • πŸ₯³Support our projects
    • ⚰️Is There Life After Death ?
  • 🌐Web Hacking
    • 🚩CTFs shortcuts
    • πŸ—ΊοΈAudits plan
      • Exposition Audit - Plan
      • Internal Audit - Plan
      • External Audit - Plan
    • πŸ•΅οΈOSINT
      • πŸ”Search Engines
      • πŸ§‘User OSINT
      • πŸ‡«πŸ‡²Domains, IP, IOT
      • πŸ•ΈοΈWebsite OSINT
      • πŸ—£οΈBreaches/Leaks
      • πŸ’ΌBusiness OSINT
      • πŸ§…TOR network
      • πŸ”¬Source Code
      • πŸ₯ΈDorks
      • βš”οΈVulnerabilities and IOC
      • πŸ“¦MISC
    • Enumeration
      • Network Scanners
      • Directory/Files Scanners
      • Web Scanners
        • Subdomains
    • πŸ”—HTTP Stuff
      • HTTP Methods
        • 403 Bypass
      • Security Headers
      • HTTP Parameters
    • πŸ”Sessions / Tokens
      • Cookies
      • JWT
        • Attacking JWT
    • πŸ’‰Injections
      • HTML | XSS
      • SQLi
        • SQLmap
        • NoSQLi
      • XXE
      • LaTex
    • πŸͺ±Web Vulnerabilities
      • CSRF
      • ClickJacking
      • Files / Upload
        • πŸ—ƒοΈFile Upload Bypass
        • πŸ“¦ZIP Slip
      • IDOR
      • LFI
        • Files to look for
      • Remote Code Execution
    • β›”WAF Bypass
    • ✍️Servers / CMS
      • 🐈Tomcat
      • πŸ’§Drupal
      • ✏️Oracle APEX
      • 🐦Apache
      • πŸ”·WordPress
        • Wordpress eBook Download < 1.2 - CVE-2016-10924
      • ⏩SAP
      • πŸ•΄οΈJenkins
      • πŸ–‡οΈJoomla!
      • 🏒Server-Side Vulnerabilities
        • Server-Side Request Forgery
        • Server-Side Template Injection
    • πŸ–‡οΈAPI
      • GraphQL
  • 🐧Linux Hacking
    • πŸ§—Privilege Escalation
      • Find passwords
      • Ansible
      • Manual Checks
      • Automated Checks
    • πŸ‘£Cover tracks
    • πŸšͺBackdoors
    • β­•Reverse Shells
      • Shell Stabilizing
      • PwnCat
      • Ping-Pong
    • πŸ”’Compiled Binaries
    • 🌊Buffer Overflow
      • Introduction
      • Fundamentals
      • Exploits
    • 🐳Docker Escape
    • 🀝File sharing
  • πŸͺŸWindows Hacking
    • πŸ‘₯Active Directory
      • 1. Reconnaissance
        • Domain Network Enumeration
          • SMB Enumeration
          • LDAP Enumeration
      • 2. Initial Attack Vectors
        • Kerberos
          • Lookupsid
          • findDelegation
          • ASREPRoast
          • Kerbrute
        • AD CS
          • Basics
          • Exploits
        • Network
          • SMBRelay
          • LLMNR_NBT NS Poisoning
            • Relay Poisoning Ressources
          • IPv6 Attacks
        • Impacket
          • Windows Secrets
        • Autologon
        • PowerView.ps1
      • 3. Post-Compromise Enumeration
        • ACLs Abuse
        • Computer enumeration
        • PowerView
        • BloodHound
        • MimiKatz
        • PingCastle
      • 4. Post-Compromise Attacks
        • WSUS Poison
        • AlwaysInstallElevated
        • DCSync
        • Dumping LSASS
        • Dumping NTDS.dit
        • Golden Tickets
        • GPP Attacks
        • Kerberoasting - SPN
        • Pass the Hash
        • Pass the Password
        • Rubeus
      • 5. PrivEsc & MISC
        • Automated scripts
        • Exploits
          • noPac - CVE-2021-42278
          • ZeroLogon - CVE-2020-1472
          • LocalPotato - CVE-2023-21746
          • PrintNightMare - CVE-2021-34527
          • Other CVEs
    • πŸ’‘Useful AD Commands
    • πŸ§—Privilege Escalation
    • 🐚Shells
    • πŸ”“Bypasses
      • UAC
      • Antivirus
      • AppLocker
      • BitLocker
    • πŸ“ƒOffice
      • Analyze office files
      • Forgot password of file ?
      • CVE-2023-21716 (Microsoft Word RCE)
    • πŸ‘©β€πŸ’»SCCM | MECM
      • Configuration Audit
      • Dump
      • Hack It
        • Reconnaisance
        • PXE/OSD Exploitation
        • NTLM Relay from SCCM Clients
        • Privilege Escalation
        • Lateral Movement
        • Malware Deployment
      • Basics
    • πŸ’ŽMicrosoft 365
      • Configuration
      • Hacking
  • πŸ’½Systems
    • πŸ•β€πŸ¦ΊServices Enumeration
    • πŸ–¨οΈPrinters
      • Printer Exploitation Tool (PRET)
      • CUPS
    • πŸ›‘οΈFortinet
    • πŸ“ΉCCTV / IP Cameras
      • Hacking
  • πŸŽ†Networks
    • πŸŒͺ️Pivoting
      • Tools / Guide
        • Proxychains / FoxyProxy
        • SSH Tunnelling / Port Forwarding
        • Plinx.exe
        • Socat
        • Chisel
        • Sshuttle
        • Ligolo-Ng : Pivoting use cases
      • SocksOverRDP
    • πŸ”₯Firewalls
      • πŸ”₯Evasion
    • πŸ”—Proxies
  • πŸ“±Mobile Hacking
    • πŸ€–Android
      • Introduction
      • Reversing
      • Static Analysis
      • Dynamic Analysis
      • Disable SSL Pinning
      • Bypass Root Detection
      • Network / Traffic Analysis
    • 🍏iOS
      • Introduction
      • Static Analysis
      • Dynamic Analysis
      • JailBreak
    • πŸ“ΊIOT
      • IOTGoat OWASP | Walkthrough
      • Resources
  • Configuration
    • ChromeOS
    • Mobile
      • Android
    • IBM
      • AS400
      • AIX
  • πŸ“‘Wireless Hacking
    • πŸŽ†Wi-Fi Attacks
      • EvilTwin
      • Cracking WPA/WPA2
      • Sniffing
    • 🫐Bluetooth
      • BLE Locks Hacking
  • πŸ‘¨β€πŸ’»Code Audit
    • βœ”οΈBest Practices
    • ❌Bad Practices
    • βš’οΈTools
  • πŸ‘Thick Client Hacking
    • πŸ“Thick Client Pentesting Methodology
    • πŸ—„οΈResources
  • πŸ—„οΈMISC
    • πŸ”‘Default Credentials
    • πŸ”»CVEs
      • [CVE-2022-0847] - dirtypipe
      • [CVE-2021-4034] - Pwnkit
      • [CVE-2021-45105] - Log4J
      • [CVE-2018-15473] - OPENSSH < 7.7
    • 🦊Browser Extensions
    • πŸ€–AI
      • chatGPT alternatives
      • Large Language Model Hacking
    • πŸ”­Hacking Labs
    • πŸ”«Exploitation Frameworks
  • πŸ•΅οΈOPSEC
    • πŸ—οΈPrivacy
      • Best tools
      • Online Anonymity
      • Browser Configuration
  • πŸ”‘CRACKING | ENCODING
    • πŸ₯ŠBruteforce tools
    • πŸ“Wordlists
    • 🧨Cracking Tools
    • πŸ”¬Encoding | Decoding Tools
    • πŸ”Steganography | Cipher
  • πŸ”΄RED TEAM
    • πŸ“₯Password Extract
      • Firefox
    • πŸ•΅οΈSpy cam
    • πŸ”’Lock Picking
    • 🎣Phishing
      • Infrastructure
      • Resources
  • πŸŒ€Whistle Blowing
    • πŸ“ΉCCTV
  • πŸ”΅BLUE TEAM
    • 🧩Forensics
    • 🦹Malware Analysis
    • πŸ› οΈTools
    • 🍯HoneyPots
    • πŸŽ†Networks Security
    • πŸͺ™Online IoC Scanners
  • 🐞Bug Bounty Related
    • Searching for CVEs
    • [FR] Legal
    • Dorks
  • πŸ–₯️DEVELOPERS
    • πŸ‘¨β€πŸ’»IDE
  • πŸ“šLEARNING
    • Windows
      • Active Directory
      • Kerberos
      • Pass-the-*
    • SQL
      • SQSHell | sqsh | skwish
      • NoSQL
      • DB infos
    • SSL/TLS
      • Configuration on MariaDB
Powered by GitBook
On this page
  • πŸ—£οΈ Breaches/Leaks
  • πŸ—£ Breaches
  • Tools
  • Investigate - Verify Leak Data
  • Metadata
  • Virus scan - You never know
  • Check photos/graphs
  • Signatures (pen)
  • Word-Doc

Was this helpful?

Edit on GitHub
Export as PDF
  1. Web Hacking
  2. OSINT

Breaches/Leaks

PreviousWebsite OSINTNextBusiness OSINT

Last updated 9 months ago

Was this helpful?

πŸ—£οΈ Breaches/Leaks

πŸ—£ Breaches

  • Usage : https://psbdmp.ws/api/search/<email>

  • Usage https://cavalier.hudsonrock.com/api/json...@email.com =======

  • Usage https://cavalier.hudsonrock.com/api/json...@email.com

Tools

Pastebins

Investigate - Verify Leak Data

https://techjournalism.medium.com/how-to-verify-leak-data-3b0c8d8b764a

Metadata

    • Tools :

    • Automate the collection of metadata, collect creation dates and store it for analysis in chronological order :

      import fitz
      from datetime import datetime
      
      def extract_creation_date(pdf_path):
          with fitz.open(pdf_path) as doc:
              try:
                  creation_date = doc.metadata.get("creationDate")
                  if creation_date:
                      creation_date = datetime.strptime(creation_date[2:16], "%Y%m%d%H%M%S")
                      return creation_date
                  else:
                      return None
              except Exception as e:
                  print(f"Error extracting creation date from {pdf_path}: {e}")
                  return None
      
      if __name__ == "__main__":
          pdf_paths = ["file1.pdf", "file2.pdf", "file3.pdf"]
          creation_dates = []
          for path in pdf_paths:
              creation_date = extract_creation_date(path)
              if creation_date:
                  creation_dates.append((path, creation_date))
          
          creation_dates.sort(key=lambda x: x[1])
          print("PDF Creation Dates (in chronological order):")
          for i, (pdf_path, date) in enumerate(creation_dates, start=1):
              print(f"{i}. {pdf_path} - {date}")

Virus scan - You never know

    • Runs two different virus scan software packages.

      • If the data runs on an external hard drive, check virus/malware on that dump of data as a whole.

Check photos/graphs

Signatures (pen)

Word-Doc

β€” An OSINT tool facilitating the discovery of breaches involving a specific email address, capable of loading public databases.

ΠΈ β€” Tools for finding passwords from compromised email addresses in public databases.

β€” Collects email account information from public sources and checks for email leaks using the haveibeenpwned.com API.

Extract the metadata from multiple images and store it in a list :

Set up a separate machine, one that perhaps connects via the

: Struggles with graphics

Search through Dorks, a lot of leaks on

🌐
πŸ•΅οΈ
πŸ—£οΈ
WhatBreach
h8mail
pwnedOrNot
Infoga
link
PDFMiner
metadata2go.com
Jimpl
VerEXIF
Metadata Interrogator
Tor Project
Yandex reverse image search
Slideshare
Chronolocate
fileproinfo
FOCA
Have I Been Pwned: Check if your email has been compromised in a data breach
Logo
https://psbdmp.ws/api/search/test@test.compsbdmp.ws
Monitors the entire Pastebin
BreachDirectory - Check If Your Email or Username was Compromised
Logo
Intelligence X
Search across IP/email/domain/bitcoin address and etc.
Snusbase Database Search Enginepublicdbhost
Indexes information from leaks and enables searching for compromised email addresses, logins, names, IP addresses, phone numbers, and password hashes.
DeHashed β€” #FreeThePassword
Almost the same as IntelX
LeakCheck - Find out if your credentials have been compromised
Email / Username, password breaches check
Logo
LeakPeek - Home
Hudson Rock - Cybercrime Intelligence Solutions
Check if the email show up in someone's stealer logs
OathNet - Find Anyone on the Internet
Find anyone that left a trace on the Internet - Free : 5 searches a day
https://psbdmp.ws/api/search/email/psbdmp.ws
add email address in url
Logo
Logo
Logo
Logo
Logo