Application for parsing, enriching, and analyzing breach data. It extracts URLs, credentials, and tokens from raw files, enriches with metadata (e.g., domain resolution, HTTP status, platform detection), and enables advanced filtering to identify and categorize leaks for effective breach response.
- Ensure MySQL is installed on your system.
- Import the database using the following command:
mysql -u root -p breached_data < breached_data.sql Make sure to be on the repository before writing this command.