All Projects → xakepnz → BLUELAY

xakepnz / BLUELAY

Licence: MIT license
Searches online paste sites for certain search terms which can indicate a possible data breach.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to BLUELAY

Leakfa.com
A simple way to know if you are on the list of major security breaches like "HIBP", but it is specific for Iran.
Stars: ✭ 106 (+341.67%)
Mutual labels:  leak, breach, data-breach
H8mail
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+8912.5%)
Mutual labels:  leak, breach
Cr3dov3r
Know the dangers of credential reuse attacks.
Stars: ✭ 1,700 (+6983.33%)
Mutual labels:  leak, leaks
Threathunt
ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
Stars: ✭ 92 (+283.33%)
Mutual labels:  threat-hunting, blueteam
AMLeaksFinder
A small tool for automatically detecting the [controller, view memory leak] in the project. 一款用于自动检测项目中【控制器内存泄漏,View 内存泄漏】的小工具,支持 ObjC,Swift。
Stars: ✭ 89 (+270.83%)
Mutual labels:  leak, leaks
Macos Attack Dataset
JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.
Stars: ✭ 116 (+383.33%)
Mutual labels:  threat-hunting, blueteam
Oblivion
Data leak checker & OSINT Tool
Stars: ✭ 237 (+887.5%)
Mutual labels:  leak, blueteam
WWWE
💧 Check your email(s) using popular online services to see if it appears in any data-breach
Stars: ✭ 22 (-8.33%)
Mutual labels:  leak, leaks
Ail Framework
AIL framework - Analysis Information Leak framework
Stars: ✭ 1,091 (+4445.83%)
Mutual labels:  data-mining, leak
Ail Framework
AIL framework - Analysis Information Leak framework
Stars: ✭ 191 (+695.83%)
Mutual labels:  data-mining, leak
uranus
[W.I.P] An ecosystem of crawlers for detecting: leaks, sensitive data exposure and attempts exfiltration of data
Stars: ✭ 22 (-8.33%)
Mutual labels:  pastebin, leak
ETWNetMonv3
ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.
Stars: ✭ 32 (+33.33%)
Mutual labels:  threat-hunting, blueteam
emperor-os
(new released v2.5 LTS.2022-06-25) It has focused on developing an All in One operating system for programming, designing and data science.Emperor-OS has over 500 apps and important tools
Stars: ✭ 32 (+33.33%)
Mutual labels:  data-mining
AppListManager
📱 AppListManager (Android Library) makes managing application and activity lists easy.
Stars: ✭ 59 (+145.83%)
Mutual labels:  leak
candis
🎀 A data mining suite for gene expression data.
Stars: ✭ 28 (+16.67%)
Mutual labels:  data-mining
chainRec
Mengting Wan, Julian McAuley, "Item Recommendation on Monotonic Behavior Chains", in Proc. of 2018 ACM Conference on Recommender Systems (RecSys'18), Vancouver, Canada, Oct. 2018.
Stars: ✭ 52 (+116.67%)
Mutual labels:  data-mining
sql-cookbook
Common SQL recipes and best practises
Stars: ✭ 68 (+183.33%)
Mutual labels:  data-mining
S2AN
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
Stars: ✭ 70 (+191.67%)
Mutual labels:  threat-hunting
BTPS-SecPack
This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommendations of multiple cyber security researchers at Microsoft. These tools were created with a small to medium size enterprise environment in mind as smaller organizations do not always have the type of funding a…
Stars: ✭ 33 (+37.5%)
Mutual labels:  blueteam
XCloud
Official Code for Paper <XCloud: Design and Implementation of AI Cloud Platform with RESTful API Service> (arXiv1912.10344)
Stars: ✭ 58 (+141.67%)
Mutual labels:  data-mining

BLUELAY

Description:

Search keywords against websites that have been indexed/spidered by Google.

  • Choose what sites to search against, what keywords to search for.
  • Examples could be: hash values, private secrets, email addresses or simply domain names.
  • Optionally proxy your requests through custom proxies to avoid Google banning.

Proof of Concept:

  • keywords.conf: BLUELAY
  • sources.conf: github.com

Alt

Install:

git clone https://github.com/xakepnz/BLUELAY.git
cd BLUELAY
pip install -r requirements.txt

Usage:

python3 bluelay.py

Edit the three config files:

  • keywords.conf containing all the keywords you want to search for.
  • sources.conf all of the sites you want to search against.
  • proxies.conf proxies to route requests through, to avoid Google ban.

Examples:

keywords.conf

# These are the keywords to search against Google. They can be simply domain names, or specific terminology.
# Anything behind a hashtag like this line, will be ignored.
BLUELAY

sources.conf

# These are new line separated domain names that you want to search against.
# The domain names must be able to be indexed/spidered by Google.
# Anything behind a hashtag like this line, will be ignored.
# pastebin.com
# pastie.org.ru
# paste.org
# hackforums.net
# antichat.ru
github.com

proxies.conf

# Enter new proxies below on a new line
# Anything behind a hashtag like this line, will be ignored.
# Format: schema://ip_or_domain:port
# http://1.1.1.1:80
# https://1.1.1.1:443
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].