CyberDudeBivash IOC
& Breach Checker
v1.1
Your first line of defense against compromised credentials & active threats. Production-grade, zero-telemetry security scanning — engineered by CyberDudeBivash Pvt Ltd.
In 2026, your email address is not private — it is currency. Your password is not secret — it is already for sale. Credential stuffing, ransomware initial access, business email compromise (BEC), and targeted spear-phishing all begin with one simple truth: someone, somewhere, already has your credentials.
According to HaveIBeenPwned (HIBP), over 12 billion accounts have been compromised across more than 700 breaches as of early 2026. In India alone, the CoWIN leak (81.5 crore Aadhaar-linked records), Air India breach (4.5 million flyers), and ongoing UPI credential harvesting have created a perfect storm for identity theft and financial fraud.
Credential stuffing attacks — where attackers use leaked username/password pairs to log into other services — now account for over 80% of account takeovers in financial and e-commerce sectors. Once inside, attackers pivot to ransomware deployment, wire fraud, or data exfiltration. IOCs (malicious URLs, IPs, file hashes) are the breadcrumbs that lead back to these campaigns. Yet most organizations and individuals have no automated way to continuously check for exposure.
This is not another toy script. It is a lightweight, secure, production-grade security tool built with the same rigor we apply to client engagements at CyberDudeBivash Pvt Ltd. From SOC analysts to individual users — this tool delivers enterprise-class threat visibility with zero cloud dependency.
# Clone the repository git clone https://github.com/cyberdudebivash/CYBERDUDEBIVASH-IOC-BREACH-CHECKER.git cd CYBERDUDEBIVASH-IOC-BREACH-CHECKER # Install dependencies pip install -r requirements.txt
# ── Single email breach check python cyberdudebivash_ioc_breach_checker.py --email "yourname@company.com" # ── Single password check (hashed — safe) python cyberdudebivash_ioc_breach_checker.py --password "P@ssw0rd123" # ── IOC check (URL example) python cyberdudebivash_ioc_breach_checker.py --ioc "malicious-example.com" --type url # ── Batch scan from JSON file python cyberdudebivash_ioc_breach_checker.py --batch batch.json --json
[
{ "email": "test1@company.com" },
{ "password": "Summer2025!" },
{ "ioc": "8.8.8.8", "type": "ip" },
{ "ioc": "e99a18c428cb38d5f260853678922e03", "type": "hash" }
]
| Persona | Use Case | Value Delivered |
|---|---|---|
| Individual | Check if personal email/password has been exposed | Immediate visibility before credential rotation |
| SOC / Blue Team | Batch scan employee emails during onboarding/offboarding | Proactive exposure management at scale |
| Incident Responders | Validate IOCs (URLs, IPs, hashes) during live investigations | Rapid triage with VirusTotal enrichment |
| Red Team / Pentest | Scan target environments for known compromised credentials | OSINT-enriched attack surface mapping |
| FinTech / Banking | Integrate into CI/CD pipelines to block credential reuse | Automated compliance & fraud prevention |
The IOC & Breach Checker is part of the CyberDudeBivash Pvt Ltd security ecosystem — a vertically integrated network of threat intelligence platforms, open-source tools, and research publications designed to protect organizations worldwide.
This tool is 100% owned and authored by CyberDudeBivash Pvt Ltd — Bivash Kumar Nayak. It is free for personal, educational, and research use with mandatory attribution. Commercial use, enterprise licensing, custom integrations, or API access requires prior written permission from the author.
Contact: bivash@cyberdudebivash.com | cyberdudebivash.com | LinkedIn
No comments:
Post a Comment