Oblivion : Data Leak Checker And OSINT Tool

Oblivion is a tool focused in real time monitoring of new data leaks, notifying if the credentials of the user has been leak out. It’s possible too verify if any credential of user has been leak out before. The Oblivion have two modes:

  • Oblivion Client: graphical mode.
  • Oblivion Server: mode with API functionalities.

NOTE: The Oblivion Client and the Oblivion Server are independents.

Oblivion Client

Oblivion Server

Oblivion Features

  • πŸ’ͺ CVEs scan
  • β˜‘οΈ Works with powerful APIs
  • πŸ”— Works too with Google Dorks
  • πŸ”Ž Checks your password in Word Lists
  • πŸ‘€ Checks the last pastes in Pastebin
  • πŸ“„ Output to txt, docx, pdf, xlsx, json, html, xml, db
  • πŸ”’ Output to encrypted files
  • πŸ“¦ Sends result files to multiples Buckets S3
  • πŸ“ Upload the result files to Google Drive
  • πŸ“‘ Cab send result files by SSH (work with EC2)
  • πŸ“’ Notify by Telegram and e-mail
  • πŸ“Œ Includes option to hide passwords for demonstrations
  • πŸ•’ Works with scheduled scans
  • πŸ” Possible to execute loop scans

APIs

ServiceFunctionsStatus
HaveIBeenPwnedE-mails and passwordspaid
Scylla.shCleartext passwords, hashs and salts, usernames, IPs, domainfree
IntelX.ioCleartext passwords, hashs and salts, usernames, IPs, domain, Bitcoin Wallets, IBANpaid
Circl.luChecks for new CVEsfree

Usage & Configuration

For configuration or usage of Oblivion please read the documentation. All the steps were careful explained with images and examples.

Credits

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 day ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago