1. OSINTLeak

https://beta.osintleak.com/dashboard

An email breach finder tool that helps users identify if their email accounts have been compromised.

OSINTLeak provides insights into potential security risks associated with email addresses.

2. OSINT Framework

https://osintframework.com

A curated list of free open-source intelligence (OSINT) tools.

OSINT Framework provides a comprehensive collection of resources, making it a valuable reference for individuals conducting online investigations.

3. OSINTDojo Resources

https://www.osintdojo.com/resources

A collection of resources for open-source intelligence (OSINT) practitioners.

OSINTDojo Resources offers valuable tools, guides, and references to enhance the effectiveness of online investigations.

4. IntelX

https://intelx.io

IntelX is a large search engine for leaked databases.

It enables users to search and access information from various data breaches, aiding in the identification and analysis of compromised data.

5. Breach Directory

https://breachdirectory.org

This tool allows users to view parts of breached email passwords and their hashes.

It provides insights into compromised accounts, helping individuals assess the security of their email accounts.

6. Hashes.com Hash Decryptor

https://hashes.com/en/decrypt/hash/

A hash decryptor tool that can decipher a significant percentage of hashes obtained from breached directories.

It aids in revealing the original passwords associated with the hashed data.

7. OSINT Industries

https://osint.industries

This platform allows users to explore websites where people are registered using their phone numbers and emails.

It supports open-source intelligence (OSINT) gathering by providing information on user registrations across various online platforms.

8. GeoSpy.AI

https://geospy.ai

A tool that utilizes artificial intelligence for image location analysis.

GeoSpy.AI assists in determining the geographical location of images, making it valuable for geospatial intelligence and investigation purposes.