Dark Web Credential Checker

# Dark Web Credential Checker

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "Dark Web Credential Checker" with this command: npx skills add snipercat69/edgeiq-dark-web-credential-checker

Dark Web Credential Checker

Skill Name: dark-web-credential-checker Version: 1.0.0 Category: OSINT / Breach Monitoring Price: Lifetime: $39 / Optional Monthly: $7/mo (includes all Pro features permanently) Author: EdgeIQ Labs OpenClaw Compatible: Yes — Python 3, pure stdlib + requests, WSL + Linux


What It Does

Checks whether an email address or username has appeared in known data breaches and dark web exposures. Searches public breach databases and paste sites, extracts exposed records, and reports on the types of data leaked (passwords, personal info, payment data, etc.).

⚠️ Legal Notice: This tool queries public breach databases and dark web monitoring services. Do not use it for unauthorized access or to stalk others. For personal use only.


Features

  • Email breach search — check if an email appears in known breaches
  • Username lookup — search across breach compilations by username/handle
  • Breach source identification — lists which sites/services were compromised
  • Exposed data classification — categorizes what was exposed (passwords, emails, PII, payment data)
  • Date of breach — shows when the breach occurred
  • Password hash detection — identifies if cracked password hashes were exposed
  • JSON export — structured report for personal records or security audits

Tier Comparison

FeatureFreeLifetime ($39)Optional Monthly ($7/mo)
Email breach check✅ (3 emails)✅ (unlimited)✅ (unlimited)
Username search
Full breach source report
Exposed data classification
Password hash detection
JSON export
Dark web monitoring (monthly)

Installation

cp -r /home/guy/.openclaw/workspace/apps/dark-web-credential-checker ~/.openclaw/skills/dark-web-credential-checker

Usage

Basic email check (free tier)

python3 credential_checker.py --email "your_email@example.com"

Pro username + breach source search

EDGEIQ_EMAIL=your_email@gmail.com python3 credential_checker.py \
  --email "your_email@example.com" \
  --username "johndoe" \
  --pro

Full bundle scan with JSON report

EDGEIQ_EMAIL=your_email@gmail.com python3 credential_checker.py \
  --email "your_email@example.com" \
  --bundle --output breach-report.json

As OpenClaw Discord Command

In #edgeiq-support channel:

!breach user@example.com
!breach user@example.com --pro
!breach user@example.com --username johndoe --bundle

Parameters

FlagTypeDefaultDescription
--emailstringEmail address to check
--usernamestringUsername/handle to search
--proflagFalseEnable Pro features
--bundleflagFalseEnable Bundle features
--outputstringWrite JSON report to file
--timeoutint15Request timeout (seconds)

Output Example

=== Dark Web Credential Checker ===
Query: user@example.com

  [1m[91m🔴 BREACH FOUND — 4 exposures detected[0m

  [1m[91m🔴[0m Site: Adobe (2013)
    Exposed: Email, encrypted password, username
    Severity: HIGH — password hash exposed
    Date: Nov 2013

  [1m[93m🟡[0m Site: LinkedIn (2016)
    Exposed: Email, password (bcrypt)
    Severity: HIGH — 117M accounts sold online
    Date: May 2016

  [1m[93m🟡[0m Site: AdultFriendFinder (2016)
    Exposed: Email, username, IP address
    Severity: MEDIUM
    Date: May 2016

  [1m[92m✔[0m No breaches detected for username: johndoe

  Recommendation: Change password on all 4 affected accounts.
    Especially: Adobe and LinkedIn (passwords were cracked and sold)

  Threat Level: CRITICAL — 2 high-severity password exposures found

Pricing

Lifetime License: $39 — your tool forever, all features included permanently. Optional Monthly: $7/mo — for those who prefer recurring billing (cancel anytime). 👉 Buy Lifetime — $39 👉 Subscribe Monthly — $7/mo 👉 Subscribe Monthly — $7/mo

Pro Upgrade (deprecated)

All features now included in Lifetime purchase.


Data Sources

Public breach databases including (but not limited to):

  • Have I Been Pwned (HIBP) API
  • Leak detection from public paste bins
  • Known breach compilations (DeHashed, LeakCheck, etc.)

Support

Open a ticket in #edgeiq-support or email gpalmieri21@gmail.com


🔗 More from EdgeIQ Labs

edgeiqlabs.com — Security tools, OSINT utilities, and micro-SaaS products for developers and security professionals.

  • 🛠️ Subdomain Hunter — Passive subdomain enumeration via Certificate Transparency
  • 📸 Screenshot API — URL-to-screenshot API for developers
  • 🔔 uptime.check — URL uptime monitoring with alerts
  • 🛡️ headers.check — HTTP security headers analyzer

👉 Visit edgeiqlabs.com →

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

gitlab-mr-reviewer

当需要审核 GitLab 合并请求、检查 MR diff 风险、发布 GitLab 审查评论、执行 approve/request changes,或发送 MR 审查通知时使用。

Registry SourceRecently Updated
1490whrime
General

Voice Transcriber Toolkit

Voice-to-Text Transcription Toolkit - 语音识别转文字,支持Whisper/Vosk引擎,批量处理,字幕导出 | Speech recognition & transcription with Whisper/Vosk engines, batch processing, su...

Registry SourceRecently Updated
General

Gigo Lobster Taster

🦞 GIGO · gigo-lobster-taster: 正式试吃模式:跑完整评测,默认上传云端、生成个人结果页并进入排行榜。 Triggers: 试吃我的龙虾 / 品鉴我的龙虾 / lobster taste / lobster taster.

Registry SourceRecently Updated
General

Gigo Lobster Local

🦞 GIGO · gigo-lobster-local: 本地模式:跑完整评测,但不上云、不注册个人结果页,证书二维码回到官网首页。 Triggers: 本地试吃龙虾 / 离线试吃龙虾 / local lobster taste / offline lobster taste.

Registry SourceRecently Updated