OSINTLeak is an all-in-one breach intelligence platform designed to help security professionals, OSINT researchers, and enterprise teams discover, analyze, and respond to exposed information across deep and dark web sources. The platform combines comprehensive search capabilities with continuous monitoring to provide instant alerts when credentials or sensitive assets appear in data breaches, public repositories, paste sites, or stealer logs. Core Capabilities: 1. Search across massive leak databases using 15+ search parameters including email, domain, IP, username, and more 2. Monitor for organization-specific data exposure with real-time alerting 3. Identify potential security vulnerabilities through exposed configuration files and credentials 4. Track information disclosure across multiple platforms including dark web sources 5. Generate detailed reports on discovered leaked information 6. Link related breaches through advanced filtering and similar-search functionality Integration Options: 1. API, SDK, and CLI access for seamless workflow integration 2. Scalable from individual investigations to enterprise-wide security operations Target Users: - Security researchers and penetration testers - OSINT professionals tracking exposed data - Enterprise security teams protecting organizational assets - Blue teams assessing their organization's exposure footprint OSINTLeak is committed to preventing abuse and enforcing responsible use. We’ve implemented rigorous safeguards and compliance checks to ensure all users adhere to our Terms of Service and handle sensitive data ethically and lawfully.
FEATURES
15+ Search Selectors
Massive Leak & Stealer Log Database
Advanced Filtering & Similar Search
Free & Premium Plans
API Access for Automation
Monitoring & Alerts
ALTERNATIVES
A cybersecurity tool for collecting and analyzing forensic artifacts on live systems.
A library for working with Windows NT data types, providing access and manipulation functions.
A command-line tool for extracting detailed information from JPEG files, including image dimensions, compression, and metadata.
usbdeath is an anti-forensic tool that manipulates udev rules for known USB devices and performs actions on unknown USB device insertion or specific USB device removal.
XMLStarlet offers a suite of command line utilities for manipulating and querying XML documents.
A next-generation crawling and spidering framework for extracting data from websites
A free, open-source file data recovery software that can recover lost files from hard disks, CD-ROMs, and digital camera memory.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.