Showing 11 open source projects for "data breach"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    WhatBreach

    WhatBreach

    OSINT tool for discovering email addresses in known data breaches

    ...If the breach databases are publicly available, the tool can attempt to download them for further analysis. It also supports deeper investigation of email domains and related profiles, making it useful for researchers, security analysts, and penetration testers conducting reconnaissance or breach analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Cr3dOv3r

    Cr3dOv3r

    Know the dangers of credential reuse attacks

    ...The system integrates with external APIs and services to gather breach data and perform automated checks efficiently. It supports multiple modes of operation, including leak-only analysis and credential testing workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    GoSearch

    GoSearch

    OSINT tool to find usernames and digital footprints across 300+ sites

    ...The tool reduces false positives and false negatives by clearly marking uncertain matches, allowing users to quickly identify reliable results. In addition to username searches, GoSearch can check various breach intelligence databases for compromised credentials linked to a username. If password hashes are found in breach data, the tool can attempt to crack them using the Weakpass database.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    ClatScope

    ClatScope

    OSINT reconnaissance tool for IP, domain, email, and username lookups

    ...ClatScope supports dozens of OSINT operations, including domain analysis, breach checks, and account discovery.
    Downloads: 2 This Week
    Last Update:
    See Project
  • Application Monitoring That Won't Slow Your App Down Icon
    Application Monitoring That Won't Slow Your App Down

    AppSignal's Rust-based agent is lightweight and stable. Already running in thousands of production apps.

    Full APM with errors, performance, logs, and uptime monitoring. 99.999% uptime SLA on the platform itself.
    Start Free
  • 5
    truffleHog

    truffleHog

    Searches through git repositories for high entropy strings and secrets

    truffleHog searches through git repositories for high entropy strings and secrets, digging deep into commit history. TruffleHog runs behind the scenes to scan your environment for secrets like private keys and credentials, so you can protect your data before a breach occurs. Secrets can be found anywhere, so TruffleHog scans more than just code repositories, including SaaS and internally hosted software. With support for custom integrations and new integrations added all the time, you can secure your secrets across your entire environment. TruffleHog is developed by a team entirely comprised of career security experts. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    Neon Wallet

    Neon Wallet

    Self-custodial wallet for managing digital assets

    Neon Wallet is a self-custodial wallet for managing digital assets on desktop and mobile, supporting Neo, Ethereum, and EVM networks, with full user control. Available as a desktop wallet on Windows, Mac OS X, and Linux, the NEON wallet allows users to claim GAS on the NEO network.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    pwnedOrNot

    pwnedOrNot

    Check breached emails and find exposed passwords from public dumps

    pwnedOrNot is an open source OSINT tool designed to investigate whether an email address has been compromised in known data breaches and to identify exposed credentials associated with that account. The tool works by interacting with the HaveIBeenPwned (HIBP) API to determine if a given email address appears in breach databases. If the email is found in a breach, the tool proceeds to search for associated passwords within publicly available data dumps. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    SocialPwned

    SocialPwned

    OSINT tool to collect emails from social networks and find leaks

    ...It collects email addresses associated with individuals or organizations from platforms such as Instagram, LinkedIn, and Twitter. Once emails are discovered, SocialPwned searches for leaked credentials using breach databases like PwnDB and Dehashed to determine whether those accounts have appeared in data leaks. SocialPwned also integrates with GHunt to retrieve additional public information related to Google accounts linked to the discovered emails. By combining social media intelligence with breach data analysis, SocialPwned helps investigators identify reused passwords and patterns that may indicate potential security weaknesses.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    h8mail

    h8mail

    Email OSINT tool for finding breached credentials by email

    ...In addition to external services, it can integrate with premium APIs and data providers for more advanced breach intelligence capabilities. The tool is commonly used by penetration testers, OSINT investigators, and security researchers to detect compromised accounts and investigate credential leaks.
    Downloads: 1 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 10
    Encryptron

    Encryptron

    An encryption software using C# 4.0

    First of all, let us understand the need for an encryption software. Just think of you sending a message of extreme confidentiality, someone else fetches it and goes through it. A breach in the security! We can’t allow that to happen. So, virtually every data send over a network is encrypted now-a-days. Let’s look at this now: Vdmbnld!`f`ho !Sdutsohof!whrhunsr!`oe!bnedsr-!une`x!H&l!fnhof!un!rinv!xnt!`o!houdsdruhof!unqhb!ui`u!hr-!inv!un!qsdq`sd!`o!dobsxquhno!rnguv`sd!trhof!B”!5/1!`oe!Vhoenvr!Gnslr/ Qsdsdpthrhudr!...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Encrypt Flash Drive in Windows 10

    One-click to encrypt flash drive, USB drive and hard disk in Windows.

    ...It encrypts the entire USB drive, the encrypted files will be hidden, and you will only be able to access them if you run the encryption program in the encrypted flash drive and enter the correct password. In addition to the USB drive, this software can also secure other removable storage drives. From celebrities to an average person, data breach bugs everyone. With most of the software out there being too complex to use, we abstain from using them altogether. This flash drive encryption software boasts a friendly user interface, and you can easily use it to encrypt flash drive in Windows 10 without complicated steps. This software locks your storage device itself, creating an impenetrable barrier and denying unauthorized access, even if the device gets into the wrong hands.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB