Identity Breach Checker
CAPABILITY: Identity Theft ProtectionThis tool queries aggregated databases of past credential leaks. It identifies if an email or phone number was part of a major data breach (e.g., LinkedIn, Canva, or specialized COMB lists).
How to use:
- Enter a corporate email to check for employee exposure.
- Example:
admin@company.comor+919876543210 - If detected, rotate passwords and enable 2FA immediately.
Onion Search (Tor Proxy)
CAPABILITY: Deep Web ReconnaissanceStandard search engines (Google/Bing) do not index the Dark Web. This module uses Tor-aware proxies to search hidden services (.onion sites) for illegal forum posts, marketplaces, and paste sites.
How to use:
- Select an engine (Ahmia is recommended for web-cleared results).
- Search for keywords like
"database dump"or"leaked". - Note: Links will open via a web proxy; for full anonymity, use the Tor Browser.
Ransomware Exposure Monitor
CAPABILITY: Threat Actor TrackingRansomware groups publish victim data on "Wall of Shame" pages. These dorks target indexed versions of these leak sites to find if your target organization's files have been exfiltrated.
How to use:
- Browse the pre-configured dorks below.
- Click "Launch via Tor" to see live search results for specific file leaks.
- Use
site:.onion "Company Name"to look for specific breaches.