Yuleak The online automated OSINT tool

Be aware of your digital fingerprint

Get Started

OUR PROCESS

What is Yuleak?

An intelligent automated OSINT tool

Yuleak is a Cyber Threat Intelligence automation software. It is based on a complex system that analyzes OSINT information about your network, domain or Ips in real time by aggregating the largest number of sources on the market

We enrich data

This information is extracted, analyzed, enriched and stored in order to provide a full vision of your exposure

You search

Your network's data is displayed in a refined, intelligible and reuseable dashboard

Our Specifications

Yuleak in a few words

img

24/7 crawling

Our crawlers are permanently running in a high availability system

img

100+ sources

Many different sources are processed and new ones are added every month. We offer the largest number of aggregated sources currently available

img

0 connection

Yuleak does not interact with any network, every processed information comes from OSINT sources

img

No configuration

No need to install any additional software, no need to purchase any third-party service, Yuleak does all the job for you and provides a single SaaS application

img

Quick results

We provide a comprehensive dashboard with your network's data in few seconds

img

Reuseable dashboard

The digital fingerprint of your network can be regularly updated to ensure maximum security

OUR INTERFACE

A simple and comprehensive dashboard

The dashboard presents the results of your research in an intelligible and immediately usable way. Domain name, simple IP or an IP address range researches are allowed. The dashboard shows all Ips addresses or sub-domains related to your search criteria

  • Comprehensive
  • Scalable
  • Easy to use
  • Smart

What do we provide?

Be aware of your network's digital fingerprint

  • Domains and subdomains IP addresses
  • Whois information
  • Blacklisted domains
  • Fishing URLs
  • SCADA exposed
  • Torrents downloaded from your network
  • Tor nodes on your network
  • CMS indentification of your website
  • Public port scans results
  • The operating system of your servers
  • Email leaks related to your domain
  • Public HTTP/HTTPS/SOCKS proxys on your network
  • Sensitive file exposure
  • Malwares activity identified from your network
  • Anonymous logins allowed on your servers
  • Github/Gitee sensitive information
  • Dark web sensitive information

OUR OPINION

Why perform OSINT on your own network?

I

Early detection of an intruder in your network

According to Symantec 57% of ransonware attacks target small companies, Yuleak provides a low price and easy way to avoid many hacks

E

Early detection of a network administration error

Lots of hacks are opportunistic attacks, do not let the hackers execute code on your network

D

Keep an eye on your domain's configuration

Yuleak helps you manage your internet exposure by mapping all the subdomains and ip addresses related to your network

D

Identify dark web posts dealing with your network

Hackers are maybe talking about your network on the dark web

M

Detect malicious activities on one of your servers

Many hackers use hacked servers to attack other ones, Yuleak is able to alert you if one of your servers has a malicious behaviour

P

Early detection of data leaks

Many passwords are published every day by hackers. What if one of them was yours?

V

Identify your network's vulnerable servers

Be aware of your network's weaknesses

Pricing

Select a plan

Free

0 €

  • 1 dashboard
  • 5 credits
  • limited information
  • -
  • -
  • -
  • -
  • -
  • -

Starter

19 €

  • 5 dashboards
  • 100 credits
  • all alerts
  • no commercial use
  • graph access
  • API access
  • -
  • -
  • -
Buy

Advanced

150 €

  • 5 dashboards
  • 1000 credits
  • all alerts
  • no commercial use
  • graph access
  • API access
  • -
  • -
  • -
Buy

Business

---

  • unlimited dashboards
  • on-demand credits
  • all alerts
  • commercial use
  • graph access
  • API access
  • dedicated servers
  • premium support
  • multi users