Oblivion : Data Leak Checker And OSINT Tool

Oblivion is a tool focused in real time monitoring of new data leaks, notifying if the credentials of the user has been leak out. It’s possible too verify if any credential of user has been leak out before. The Oblivion have two modes:

  • Oblivion Client: graphical mode.
  • Oblivion Server: mode with API functionalities.

NOTE: The Oblivion Client and the Oblivion Server are independents.

Oblivion Client

Oblivion Server

Oblivion Features

  • πŸ’ͺ CVEs scan
  • β˜‘οΈ Works with powerful APIs
  • πŸ”— Works too with Google Dorks
  • πŸ”Ž Checks your password in Word Lists
  • πŸ‘€ Checks the last pastes in Pastebin
  • πŸ“„ Output to txt, docx, pdf, xlsx, json, html, xml, db
  • πŸ”’ Output to encrypted files
  • πŸ“¦ Sends result files to multiples Buckets S3
  • πŸ“ Upload the result files to Google Drive
  • πŸ“‘ Cab send result files by SSH (work with EC2)
  • πŸ“’ Notify by Telegram and e-mail
  • πŸ“Œ Includes option to hide passwords for demonstrations
  • πŸ•’ Works with scheduled scans
  • πŸ” Possible to execute loop scans

APIs

ServiceFunctionsStatus
HaveIBeenPwnedE-mails and passwordspaid
Scylla.shCleartext passwords, hashs and salts, usernames, IPs, domainfree
IntelX.ioCleartext passwords, hashs and salts, usernames, IPs, domain, Bitcoin Wallets, IBANpaid
Circl.luChecks for new CVEsfree

Usage & Configuration

For configuration or usage of Oblivion please read the documentation. All the steps were careful explained with images and examples.

Credits

R K

Recent Posts

How to Install Docker on Ubuntu (Step-by-Step Guide)

Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…

5 days ago

Uninstall Docker on Ubuntu

Docker is one of the most widely used containerization platforms. But there may come a…

5 days ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

6 days ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

1 week ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

1 week ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

1 week ago