Skip to main content

Find leaked information in different kind of services

Project description

Latest version released on PyPi Package license

Stay tuned for updates - under heavy development

leaked is a toolkit to find sensitive and security relevant information in different kind of sources.

These sources are implemented as extensible providers. In order to find sensitive information in these providers there are a bunch of modules. Each module contains information to the according service the information belongs to and one or more search terms.

Examples for providers are:

  • GitHub
  • Local Repository

Examples for Modules are:

  • FTP
  • WordPress
  • RSA private keys
  • System Credentials


  • A beautiful command-line interface thanks to click.
  • Implemented to be easily extensible.


Gather information:

$ leaked gather -p github -m wordpress

Show providers:

$ leaked providers

Show modules:

$ leaked modules

Known Issues

Due to some asynchronous requests to GitHub it triggers a abuse detection mechanism and no further requests are possible for a specific amount of time.


leaked is released under the MIT License. See the bundled LICENSE file for details.

Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Files for leaked, version 0.0.3
Filename, size File type Python version Upload date Hashes
Filename, size leaked-0.0.3.tar.gz (6.5 kB) File type Source Python version None Upload date Hashes View

Supported by

Pingdom Pingdom Monitoring Google Google Object Storage and Download Analytics Sentry Sentry Error logging AWS AWS Cloud computing DataDog DataDog Monitoring Fastly Fastly CDN DigiCert DigiCert EV certificate StatusPage StatusPage Status page