Oblivion : Data Leak Checker And OSINT Tool

Oblivion is a tool focused in real time monitoring of new data leaks, notifying if the credentials of the user has been leak out. It’s possible too verify if any credential of user has been leak out before. The Oblivion have two modes:

  • Oblivion Client: graphical mode.
  • Oblivion Server: mode with API functionalities.

NOTE: The Oblivion Client and the Oblivion Server are independents.

Oblivion Client

Oblivion Server

Oblivion Features

  • πŸ’ͺ CVEs scan
  • β˜‘οΈ Works with powerful APIs
  • πŸ”— Works too with Google Dorks
  • πŸ”Ž Checks your password in Word Lists
  • πŸ‘€ Checks the last pastes in Pastebin
  • πŸ“„ Output to txt, docx, pdf, xlsx, json, html, xml, db
  • πŸ”’ Output to encrypted files
  • πŸ“¦ Sends result files to multiples Buckets S3
  • πŸ“ Upload the result files to Google Drive
  • πŸ“‘ Cab send result files by SSH (work with EC2)
  • πŸ“’ Notify by Telegram and e-mail
  • πŸ“Œ Includes option to hide passwords for demonstrations
  • πŸ•’ Works with scheduled scans
  • πŸ” Possible to execute loop scans

APIs

ServiceFunctionsStatus
HaveIBeenPwnedE-mails and passwordspaid
Scylla.shCleartext passwords, hashs and salts, usernames, IPs, domainfree
IntelX.ioCleartext passwords, hashs and salts, usernames, IPs, domain, Bitcoin Wallets, IBANpaid
Circl.luChecks for new CVEsfree

Usage & Configuration

For configuration or usage of Oblivion please read the documentation. All the steps were careful explained with images and examples.

Credits

R K

Recent Posts

How OpenClaw Works

Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive…

19 hours ago

How to Use the Linux find Command to Locate Files Like a Pro

Managing files efficiently is a core skill for anyone working in Linux, whether you're a…

3 days ago

How to Check Open Ports in Linux Using netstat, ss, and lsof

Open ports act as communication endpoints between your Linux system and the outside world. Every…

3 days ago

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

5 days ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

5 days ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

3 months ago