πŸ•΅οΈ Every Tool Hackers Use to Find Your Data (Now You Can Too)

:unlocked: 100% Free Breach Search Engines That Show Your Actual Leaked Passwords


:world_map: One-Line Flow: Type an email β†’ see every breach, password, and dark corner of the internet where it appeared.


Why this matters:

Your email has been living a secret life across leaked databases, hacker forums, and malware logs. These tools let you see exactly what the bad guys already know β€” passwords, accounts, even browser autofill data. Same intel that costs thousands for corporations? Yours for free. Knowing your exposure = knowing what to fix before someone exploits it.


:bullseye: What You’re Getting

Expand: The Big Picture

You’re about to access the same breach intelligence used by:

  • Security researchers investigating hacks
  • Journalists tracking data leaks
  • Law enforcement finding compromised accounts
  • Pentesters checking client exposure

Input: Email, username, phone, domain
Output: Every breach, paste, darknet mention, stealer log, and leaked password tied to it

No coding. No terminal. Just type and watch the results roll in.


:high_voltage: TIER 1: Instant Web Tools (Zero Setup)

Type. Click. Results. That’s it.


:fire: The Heavy Hitters (100% Free, Full Power)

pwndb.com β€” The Stealer Log Monster

:link: pwndb.com

What Details
Records 100+ Billion
Speciality Infostealer malware logs
Shows Full results
Limits None
Account Not needed

This isn’t regular breach data. This is credentials harvested by actual malware (trojans, infostealers) from infected computers. The freshest, most dangerous type of leaked data.

Use it when: You want to know if your credentials were stolen by malware, not just leaked in a breach.

ProxyNova COMB β€” The Password Revealer

:link: proxynova.com/tools/comb

What Details
Database COMB (Combination of Many Breaches)
Records Billions
Shows Actual passwords in cleartext
Account Not needed
Limits None

Searches the legendary COMB database β€” the largest credential compilation ever assembled. Shows real passwords, not hashed garbage.

The move: Check your email β†’ see your actual leaked passwords β†’ change them immediately.

XposedOrNot β€” Open Source + Free API

:link: xposedornot.com

What Details
Passwords indexed 850 Million+
API Completely free, unlimited
Code Fully open source
Features Email breach check, password exposure, domain monitoring, risk scoring, alerts

Key pages:

Why it’s different: Completely transparent. You can literally read the code. Plus free monitoring alerts.

DataBreach.com β€” Stealer Logs + Recent Breaches

:link: databreach.com

What Details
Coverage Stealer logs, traditional breaches, recent leaks
Notable ALIEN TXTBASE (284M emails), 2025 breaches indexed fast
Shows Breach timeline, source names, categories
Account Not needed

Direct links:

Clean interface. Shows breach timeline. Updated fast when new leaks drop.

Have I Been Pwned β€” The OG (Now With Stealer Logs)

:link: haveibeenpwned.com

What Details
Breaches 700+ indexed
NEW 2025 Now searches stealer logs
Notable data ALIEN TXTBASE (23B rows, 284M emails), Synthient (183M), Data Troll
Shows Which specific websites your credentials were captured on
Alerts Free email notifications

The industry standard just got serious. Now tells you exactly which sites your email+password combo was entered into when malware captured it.

Pro tip: Subscribe for free alerts. Get notified the moment you appear in a new breach.


:shield: Infostealer Detection

Hudson Rock Free Tools β€” Were You Infected?

:link: hudsonrock.com/threat-intelligence-cybercrime-tools

What Details
Speciality Infostealer infection checking
Malware tracked RedLine, Lumma, Raccoon, Vidar, StealC
Check by Domain, email, username, Android apps, technology stack
Background Built by IDF 8200 cyber unit alumni

Different from breach data: This checks if credentials were stolen by malware running on infected devices β€” corporate VPN access, webmail, cloud credentials. The stuff that leads to ransomware.

Use it when: You want to know if you (or your employees) got infected, not just breached.


:magnifying_glass_tilted_left: More Free Checkers

Expand: The Full Free List
Platform Link What It Does
HEROIC Breach Scanner heroic.com/breach-scan Dark web + breach forums + stealer logs. Search by email, domain, IP, username, phone
LeakPeek leakpeek.com Shows leaked passwords. SMS/email monitoring alerts
BreachCheck.io breachcheck.io Dark web passwords + PII exposure
HackCheck.io hackcheck.io Data breach search engine
BreachDirectory.org breachdirectory.org Shows SHA-1 hash of password (crack at crackstation.net)
Scattered Secrets scatteredsecrets.com EU-based, actively cracks passwords from breaches
CyberNews cybernews.com/personal-data-leak-check 500GB+ database, instant check
Mozilla Monitor monitor.mozilla.org HIBP data with Mozilla privacy
F-Secure Checker f-secure.com/identity-theft-checker Report sent to your email
NPD Breach Check npd.pentester.com National Public Data breach (2.9B records)

:high_voltage: TIER 2: Deep Search Engines

When you need to dig deeper than basic breach checks.


Intelligence X (IntelX) β€” Darknet + Tor + I2P + Pastes

:link: intelx.io

What Details
Records 200+ Billion
Sources Darknet (Tor/I2P), Pastebin, WHOIS, leaked databases, PDFs
Search by Email, domain, IP, CIDR, Bitcoin address
Free tier Limited but functional
Special Free accounts for journalists/academics (apply)

The tools page is gold: intelx.io/tools β€” opens 20+ search engines simultaneously. Free. No account.

Searches across:

  • Email breach databases
  • Username lookups
  • Domain/IP info
  • Social media (Facebook, Twitter, LinkedIn, Telegram, YouTube)
  • Bitcoin addresses
  • Phone numbers
  • Hash lookups
  • Google Analytics/AdSense IDs

Phonebook feature: phonebook.cz β€” Find all emails/subdomains/URLs for any domain (268B records)

OSINT Industries β€” Timeline Visualization

:link: osint.industries

What Details
Sources 1500+
Search by Email, phone, username, crypto wallets
Feature Timeline visualization of activity

Shows when accounts were created, when they appeared in breaches, activity patterns. Great for building a complete picture.

Venacus β€” 70TB of Raw Leak Data

:link: venacus.com

What Details
Data 70TB+ of leaked files
Search ANY string β€” email, domain, password, anything
Features MITRE ATT&CK mapping, cross-service search, bookmarks

Not limited to emails. Search ANY text across massive leak archives. Like Google for breaches.

Features: venacus.com/features

LeakRadar β€” Fresh Stealer Logs Weekly

:link: leakradar.io

What Details
Records 75 Billion+ plain-text credentials
Updated 100M+ new credentials indexed weekly
Data Stealer logs, combolists, database breaches, dark web dumps
Search by URL, domain, username, password, email, TLD
Shows Plain text passwords (not hashes)

They publish weekly stats on how many credentials indexed. Search is free.

StealSeek β€” Stealer Log Hunting

:link: stealseek.io

Built specifically for hunting through stealer log data. Fresh credentials from infostealer malware.

IKnowYour.Dad β€” 86 Billion Records

:link: iknowyour.dad

What Details
Records 86+ Billion
Databases 3,877+
Search by Email, phone, username, password, documents

Massive database. Searches everything.

CredenShow β€” Simple Breach Search

:link: credenshow.com

Data breach search engine. Enter email β†’ get breach results with credential details.


:high_voltage: TIER 3: Username & Email Intelligence

Find every account tied to a username or email across the internet.


:magnifying_glass_tilted_left: Username Enumeration

WhatsMyName.app β€” 640+ Platforms Instantly

:link: whatsmyname.app

What Details
Platforms checked 640+
Speed Instant
Account Not needed

Type a username β†’ see every platform where that username exists. Social media, forums, gaming, everything.

The data source: github.com/WebBreacher/WhatsMyName β€” open source JSON file that powers multiple tools.

More Username Tools
Tool Link Platforms Notes
Instant Username instantusername.com 100+ Check username availability
Namechk namechk.com Domains + social Username + domain availability
CheckUsernames checkusernames.com 500+ Social network search
KnowEm knowem.com 500+ Brand protection focus

:e_mail: Email Intelligence

Epieos β€” Silent Email Reconnaissance

:link: epieos.com

What Details
Sites checked 200+
Method Silent (target not notified)
Shows Google account data, registered sites, social profiles
Free tier Basic info
Paid €29.99/month for full modules

Why it’s different: Doesn’t ping the target. No false positives. Replaced the old Holehe module with proprietary engine that’s actually maintained.

More Email Tools
Tool Link What It Does
Hunter.io hunter.io Find corporate email patterns. Domain β†’ all employee emails
EmailRep emailrep.io Email reputation scoring
Email Format email-format.com Company email format patterns
That’s Them thatsthem.com Reverse email/phone/address lookup
Experte Email Finder experte.com/email-finder Name + domain β†’ email guesses

:high_voltage: TIER 4: CLI Tools (Extra Power)

For when you want to run searches locally or automate things.


h8mail β€” The Aggregator
pip install h8mail
h8mail -t [email protected]

Queries multiple services at once:

  • Snusbase
  • DeHashed
  • LeakCheck
  • HIBP
  • IntelX
  • HunterIO
  • BreachDirectory

Supports local breach searching if you have the files.

GitHub: github.com/khast3x/h8mail

Sherlock β€” Username Hunter
pip install sherlock-project
sherlock username

Checks 400+ sites for username existence. The classic.

GitHub: github.com/sherlock-project/sherlock

Maigret β€” Sherlock on Steroids
pip install maigret
maigret username

Enhanced Sherlock with profile data extraction. Pulls additional info from found profiles.

GitHub: github.com/soxoj/maigret

Holehe β€” Email Site Registration Checker
pip install holehe
holehe [email protected]

Checks which sites an email is registered on. Silent reconnaissance.

GitHub: github.com/megadose/holehe

Mosint β€” All-in-One Email OSINT
go install github.com/alpkeskin/mosint/v3/cmd/mosint@latest
mosint [email protected]

Combines: breach check, DNS lookup, social media, paste sites.

GitHub: github.com/alpkeskin/mosint

Linkook β€” Connected Account Discovery
git clone https://github.com/JackJuly/linkook
python linkook.py -u username

Finds connected accounts even with different usernames. Follows relationship links.

GitHub: github.com/JackJuly/linkook

LeakSearch β€” ProxyNova COMB Direct
git clone https://github.com/JoelGMSec/LeakSearch
python LeakSearch.py -d ProxyNova -k [email protected]

Query ProxyNova COMB directly from terminal. JSON/TXT export.

GitHub: github.com/JoelGMSec/LeakSearch


:high_voltage: TIER 5: Multi-Tool Portals

One-stop shops that organize everything.


OSINT Framework

:link: osintframework.com

Visual map of 100+ OSINT tools organized by category. Click through the tree to find exactly what you need.

OSINT Combine Tools

:link: osintcombine.com/tools

Curated collection of working OSINT tools. Regularly updated.

IntelTechniques Tools

:link: inteltechniques.com/tools

Michael Bazzell’s collection. Used by actual investigators.

Bellingcat Toolkit

:link: bellingcat.gitbook.io/toolkit

Investigative journalism tools. Vetted and documented.

Awesome OSINT GitHub

:link: github.com/jivoi/awesome-osint

Massive curated list. If it exists, it’s probably here.

Awesome Hacker Search Engines

:link: github.com/edoardottt/awesome-hacker-search-engines

Search engines for pentesting, OSINT, bug bounty. Organized by category.


:fire: Investigation Workflows

Copy-paste these for different scenarios.


Email Investigation Chain
Target: [email protected]

1. [HIBP] β†’ Identify breaches + stealer log exposure
   ↓
2. [pwndb.com] β†’ Check infostealer infection  
   ↓
3. [ProxyNova COMB] β†’ Get actual leaked passwords
   ↓
4. [Epieos] β†’ Find registered sites + Google account data
   ↓
5. [DataBreach.com] β†’ Recent breach exposure
   ↓
6. [IntelX] β†’ Darknet/paste/Tor mentions
   ↓
7. [XposedOrNot] β†’ Set up monitoring alerts
Username Investigation Chain
Target: username123

1. [WhatsMyName.app] β†’ 640+ platform enumeration
   ↓
2. [Sherlock/Maigret] β†’ Deep check + profile extraction
   ↓
3. [Linkook] β†’ Find connected accounts (different usernames)
   ↓
4. If email found β†’ Run email workflow above
   ↓
5. [IntelX Tools] β†’ Multi-search social platforms
Domain/Company Investigation
Target: company.com

1. [Hunter.io] β†’ Corporate email pattern discovery
   ↓
2. [Phonebook.cz] β†’ All emails/subdomains/URLs (268B records)
   ↓
3. [Hudson Rock] β†’ Employee infostealer exposure
   ↓
4. [IntelX] β†’ Leaked documents, paste mentions
   ↓
5. For each email found β†’ Run email workflow

:bar_chart: Quick Reference Tables

100% Free Platforms Comparison
Platform Stealer Logs Shows Passwords Unlimited No Account
pwndb.com :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark:
ProxyNova COMB :cross_mark: :white_check_mark: :white_check_mark: :white_check_mark:
DataBreach.com :white_check_mark: :cross_mark: :white_check_mark: :white_check_mark:
XposedOrNot :cross_mark: :white_check_mark: (check) :white_check_mark: :white_check_mark:
HIBP :white_check_mark: :cross_mark: :white_check_mark: :white_check_mark:
HEROIC :white_check_mark: :cross_mark: :white_check_mark: :white_check_mark:
LeakPeek :cross_mark: :white_check_mark: :white_check_mark: :white_check_mark:
BreachDirectory.org :cross_mark: SHA-1 hash :white_check_mark: :white_check_mark:
Hudson Rock :white_check_mark: :cross_mark: :white_check_mark: :white_check_mark:
IntelX Tools N/A N/A :white_check_mark: :white_check_mark:
Venacus :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark:
What Each Category Means
Category What It Is Best Free Source
Data Breaches Hacked company databases (LinkedIn, Adobe, etc.) HIBP, DataBreach.com
Pastes Text dumps on Pastebin and similar IntelX, HIBP
Darknet Tor/I2P hidden service mentions IntelX, pwndb
Stealer Logs Malware-harvested credentials from infected PCs pwndb.com, Hudson Rock, LeakRadar
Combos/Lists Compiled credential lists (email:password) ProxyNova COMB
WHOIS Domain registration records IntelX Tools
Autofills Browser-saved form data (names, addresses, cards) Stealer log platforms

:brain: Understanding Stealer Logs

Why This Matters More Than Regular Breaches

Regular breach: Company gets hacked β†’ their database leaks β†’ your email+password from that one site.

Stealer log: Your actual computer (or someone else’s with your credentials) gets infected with malware β†’ it harvests EVERYTHING:

  • Every password saved in your browser
  • Session cookies (bypasses 2FA)
  • Autofill data (credit cards, addresses)
  • Discord tokens, Telegram sessions
  • Crypto wallet files
  • Screenshots of your desktop

The infection sources:

  • Pirated software/games with cracks
  • β€œFree” premium tools
  • Malicious downloads disguised as videos
  • Phishing attachments

Major infostealers in 2025:

  • Lumma (most dominant)
  • RedLine
  • Vidar
  • Raccoon
  • StealC

Where logs end up:

  • Telegram channels (ALIEN TXTBASE, Moon Cloud, Observer Cloud)
  • Dark web autoshops (Russian Market, Genesis Market)
  • Criminal forums

The platforms in this guide index that data so you can check your exposure.


:warning: Legal & Ethical

Expand: Stay Safe

Always legal:

  • Checking your own email/accounts
  • Security research on your own systems
  • Authorized penetration testing

These tools are used by:

  • Law enforcement investigating crimes
  • Security teams protecting companies
  • Journalists investigating leaks
  • Researchers studying breaches
  • Individuals checking their own exposure

Don’t:

  • Access accounts using found credentials
  • Harass people with discovered information
  • Use for unauthorized access to any system

Remember: Your email appearing in breaches doesn’t always mean YOU were hacked. It could be:

  • Third-party services you registered on
  • Companies that stored your data insecurely
  • Marketing databases sold or leaked
  • Contact lists from infected devices (not yours)

Knowing your exposure = knowing what to protect.


:rocket: Quick Start (5 Minutes)

Do This Right Now

Step 1: Go to haveibeenpwned.com β†’ enter your main email β†’ see breach list

Step 2: Go to proxynova.com/tools/comb β†’ same email β†’ see if actual passwords leaked

Step 3: Go to pwndb.com β†’ check if you’re in stealer logs

Step 4: Go to hudsonrock.com/threat-intelligence-cybercrime-tools β†’ check if your device was infected

Step 5: If any passwords found β†’ change them everywhere you used them β†’ enable 2FA

Step 6: Subscribe to HIBP alerts for ongoing monitoring

Total time: 5 minutes. Knowledge gained: priceless.


The difference between you and a hacker? They already checked your exposure. Now you can too.

Your data is already out there. These tools just show you what the bad guys already know.

Type your email. See the damage. Fix what matters.

15 Likes

Thanks srz needed it i found one with payment so this are very useful

1 Like

Useful share, thanks

1 Like

Brilliant Like Always @SRZ , I really appreciate you

1 Like

Thanks for sharing this useful info!

1 Like

Thanks a lot for sharing this.

1 Like

Thank you for sharing so much great information.

1 Like