-
-
Notifications
You must be signed in to change notification settings - Fork 37
Running
Learn about running leaker with practical examples and expected output
For all flags and options, see the Usage page. This page covers common workflows with example commands and output.
leaker email user@example.com __ __
/ /___ ____ _/ /_____ _____
/ / _ \/ __ \/ //_/ _ \/ ___/
/ / __/ /_/ / ,< / __/ /
\___/\__,_/_/|_|\___/_/ v1.4.0
vflame6
Use with caution. You are responsible for your actions.
Developers assume no liability and are not responsible for any misuse or damage.
[INF] Enumerating leaks for user@example.com
email:user@example.com, password:hunter2, database:Collection1
email:user@example.com, username:johndoe, hash:5f4dcc3b5aa765d61d8327deb882cf99, database:LinkedIn2012
[INF] Found 2 leaks for user@example.com in 4.231s
leaker username johndoeFind all leaked credentials for a domain:
leaker domain example.comSearch for any keyword across breach databases:
leaker keyword "company name"leaker phone 1234567890leaker email user@example.com -s leakcheck,dehashedUse -s with only the sources you want. To see all available sources:
leaker -L[INF] Current list of available sources. [12]
[INF] Sources marked with an * require key(s) or token(s) to work.
[INF] You can modify /home/user/.config/leaker/provider-config.yaml to configure your keys/tokens.
breachdirectory *
dehashed *
hudsonrock
intelx *
leakcheck *
leaklookup *
leaksight *
osintleak *
proxynova
snusbase *
weleakinfo *
whiteintel *
leaker email user@example.com -o results.txtIf the file already exists, use --overwrite to replace it:
leaker email user@example.com -o results.txt --overwriteOutput results as one JSON object per line - ideal for parsing and pipeline integration:
leaker email user@example.com -j{"source":"leakcheck","target":"user@example.com","email":"user@example.com","password":"hunter2","database":"Collection1"}
{"source":"dehashed","target":"user@example.com","email":"user@example.com","username":"johndoe","hash":"5f4dcc3b5aa765d61d8327deb882cf99","database":"LinkedIn2012"}Combine JSONL with file output:
leaker email user@example.com -j -o results.jsonlShow which source each result came from:
leaker email user@example.com -v[leakcheck] email:user@example.com, password:hunter2, database:Collection1
[dehashed] email:user@example.com, username:johndoe, hash:5f4dcc3b5aa765d61d8327deb882cf99, database:LinkedIn2012
Suppress the banner and info messages - print only results:
leaker email user@example.com -qemail:user@example.com, password:hunter2, database:Collection1
email:user@example.com, username:johndoe, hash:5f4dcc3b5aa765d61d8327deb882cf99, database:LinkedIn2012
Use -V to enrich results with HIBP breach counts and hash type identification:
leaker email user@example.com -Vemail:user@example.com, password:hunter2, database:Collection1, hibp_count:17043, hash_type:unknown
email:user@example.com, hash:5f4dcc3b5aa765d61d8327deb882cf99, database:LinkedIn2012, hash_type:md5
The verification feature:
- HIBP password check - queries the Pwned Passwords API using k-anonymity (only the first 5 chars of the SHA-1 hash are sent). Returns how many times the password has appeared in known breaches.
- Hash identification - identifies the hash algorithm by format. Supports: md5, sha1, sha256, sha512, bcrypt, md5crypt, sha256crypt, sha512crypt, and argon2.
echo "user@example.com" | leaker emailChain leaker with other tools for automated workflows:
leaker domain example.com -q -j | jq -r '.password // empty' | sort -u > passwords.txtExtract unique emails from a domain search:
leaker domain example.com -q -j | jq -r '.email // empty' | sort -uRoute all traffic through an HTTP proxy (e.g., Burp Suite):
leaker email user@example.com --proxy http://127.0.0.1:8080For proxies with self-signed certificates:
leaker email user@example.com --proxy http://127.0.0.1:8080 --insecureBy default, leaker removes duplicate results across sources. To keep all results:
leaker email user@example.com --no-deduplicationBy default, leaker filters out results that don't contain the target string. To include all results returned by sources:
leaker email user@example.com --no-filterRun leaker in a Docker container:
docker build -t leaker .
docker run leaker email user@example.comMount your provider config:
docker run -v $HOME/.config/leaker:/home/app/.config/leaker leaker email user@example.com