Site search

Search results: «Leaks»

Found matches: 6

👨🏽 💻 𝗟𝗲𝗮𝗸𝗣𝗲𝗲𝗸

OSINT tool that allows to perform searches by email, username, password, password, domain, IP address, full name, hash or phone, in order to verify if associated information has been exposed in public leaks, showing partial and anonymous results. 🕵🏽 ♂️

👁️ These types of platforms are used for cybersecurity awareness, risk analysis and personal auditing, not to exploit information.

💻 https://leakpeek.com/

nic In my OSINT Manual you can find many more tools, techniques and practical cases, always from an ethical, legal and responsible approach, making clear the limits of information use.

👉 Manual OSINT: https://hackunderway.com/producto/manual-osint/

#JeyZeta #OSINT...
4.3 Lobby (Exclusive Leaks)
A17 BONUS PASS Full Leaks
Release - Tomorrow
Access leaked documents, files , pictures, and personal details of companies and high profile people 0f 36 countries.
Access Leaks: https://search.libraryofleaks.org/
Access leaked documents, files , pictures, and personal details of companies and high profile people 0f 36 countries.
Access Leaks: https://search.libraryofleaks.org/
🚨 Think your location is safe when you post a selfie? Think again.

Hackers don’t always need GPS access — sometimes your social media photo alone gives away more than you realize. Here’s how they can track location from a single pic 👇

📸 1. Hidden EXIF Metadata
Many photos contain embedded data like GPS coordinates, device info, and timestamp.
If the platform doesn’t strip it, someone can extract it in seconds.

🪟 2. Background Clues
Street signs, shop names, vehicle plates, landmarks, even reflections in mirrors — all can reveal where you are.
OSINT tools make this shockingly fast....