Investigator Use
Use Netdata Directory when working in the Breach & Leak OSINT phase of an investigation. Open it after recording the target, source URL, time, and reason for use in your case notes.
Before You Pivot
Record Context
Capture the target, search terms, and why this source is relevant before you leave the page.
Preserve Evidence
Archive volatile pages, save screenshots, and keep timestamps for anything that may change.
Corroborate
Treat one tool as a lead source. Confirm important findings with independent sources.
Related Tools
DeHashed
Breach & Leak OSINT
Breach intelligence service for searching exposed usernames, emails, IPs, and related data, with monitoring, API, and WHOIS features.
Digital Traces
Breach & Leak OSINT
Digital Traces is an OSINT resource for breach and leak intelligence research. It supports breach monitoring, credential exposure analysis, and leak investigations.
Git Leaks
Breach & Leak OSINT
Git Leaks is an OSINT resource for blockchain analysis and cryptocurrency tracing. It supports investigative utilities, digital tracking, and workflow automation.
Haveibeenpwned
Breach & Leak OSINT
Have I Been Pwned lets investigators check whether email addresses and domains appear in known data breaches and credential leaks. This resource supports email verification, account discovery, and identity correlation.