Here you will find all the online tools that a good cybersecurity investigator needs.
- 🔎 Search Engines
- 🗝️ Credentials
- 📃 Documents
- 🖼️ Images
A collection of browsers and online search engines on various assets, from exposed credentials to leaked documents.
Search engines and databases on exposed credentials and personal data.
URL | Plan | API | Description |
---|---|---|---|
BreachDirectory | 🆓 | 💵 | Database of leaked credentials and personal data (with partial preview). It also offers data, monitoring, credential checking and API access. |
DeHashed | 🆓💵 | 💵 | Database of leaked credentials and personal data (with paid preview), with advanced search engine based on dorks. It also offers data wells, monitoring, whois and API access. |
Have I Been Pwned? | 🆓 | 💵 | Database of leaked credentials and personal data (without preview). It also offers data wells, monitoring, credential checking and API access. |
Search engines and databases on leaked documents.
URL | Plan | API | Description |
---|---|---|---|
Intelligence X | 🆓💵 | 💵 | Database of leaked documents (with partial and paid preview). |
Search engines capable of recognizing and classifying images.
URL | Plan | API | Description |
---|---|---|---|
Google Images | 🆓 | 🚫 | Reverse image search (not very accurate). |
PimEyes | 🆓💵 | 🚫 | Reverse face image search (with partial and paid preview). |