Oblivion : Data Leak Checker And OSINT Tool

Oblivion is a tool focused in real time monitoring of new data leaks, notifying if the credentials of the user has been leak out. It’s possible too verify if any credential of user has been leak out before. The Oblivion have two modes:

  • Oblivion Client: graphical mode.
  • Oblivion Server: mode with API functionalities.

NOTE: The Oblivion Client and the Oblivion Server are independents.

Oblivion Client

Oblivion Server

Oblivion Features

  • 💪 CVEs scan
  • ☑️ Works with powerful APIs
  • 🔗 Works too with Google Dorks
  • 🔎 Checks your password in Word Lists
  • 👀 Checks the last pastes in Pastebin
  • 📄 Output to txt, docx, pdf, xlsx, json, html, xml, db
  • 🔒 Output to encrypted files
  • 📦 Sends result files to multiples Buckets S3
  • 📁 Upload the result files to Google Drive
  • 📡 Cab send result files by SSH (work with EC2)
  • 📢 Notify by Telegram and e-mail
  • 📌 Includes option to hide passwords for demonstrations
  • 🕒 Works with scheduled scans
  • 🔁 Possible to execute loop scans

APIs

ServiceFunctionsStatus
HaveIBeenPwnedE-mails and passwordspaid
Scylla.shCleartext passwords, hashs and salts, usernames, IPs, domainfree
IntelX.ioCleartext passwords, hashs and salts, usernames, IPs, domain, Bitcoin Wallets, IBANpaid
Circl.luChecks for new CVEsfree

Usage & Configuration

For configuration or usage of Oblivion please read the documentation. All the steps were careful explained with images and examples.

Credits

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

14 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

14 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

14 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

14 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

15 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

17 hours ago