There are 27 repositories under data-breach topic.
OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.
Firefox Monitor arms you with tools to keep your personal information safe. Find out what hackers already know about you and learn how to stay a step ahead of them.
🔒 Password Exposed Helper Function - Check if a password has been exposed in a data breach.
A simple way to know if you are on the list of major security breaches like "HIBP", but it is specific for Iran.
🔒 Laravel validation rule that checks if a password has been exposed in a data breach.
A web application featuring some handy password tools
503925365条微博个壬信息惨遭扫爆,an网售价不到20元人民币!本工具可以帮恁查询恁的微博账号是否中招
Curated list of data leaks around the world
Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.
Validate that a password hasn't been exposed in a data breach.
Case study using dotfurther's Open Discover Platform with the RavenDB document store to rapidly create a full-text search/eDiscovery/information governance capable demonstration application.
Strumenti per Domini - Whois - IP - Data Breach - Email
Visualize world's biggest data breaches & hacks in bar charts.
🗄️💧 Find exposed and unsecured databases from a list of hosts. 🗄️💧
Repository for the winning code for the Internet & Cybersecurity track of the MIT Policy Hackathon.
Generate unique email aliases for online services
have your password pwned on databreach ? donot worry you can get it is pawned or not with this python script
Stelight is an advanced OSINT suite with amazing features for collecting information about phone numbers and email addresses.
iOS app that allows users to check whether an account has been compromised in one of the known data breaches.
Laravel Validation rule to check that a password hasn't been exposed
Search the haveibeenpwned.com database to see if a username or email address is listed
Explore the Uber Data Breach - Case Study repository, where an in-depth analysis of the 2022 Uber data breach unfolds. Uncover the sequence of attacks, vulnerabilities exploited, and lessons learned from this significant cybersecurity incident.
BlackhawkLAB - cloud based end point detection and remediation solution
Estimate cost of a data breach based on findings within the IBM Cost of a Data Breach report