Stealer logs
SquareBreach indexes credentials, cookies and browser fingerprints from infostealer malware drops including RedLine, Raccoon, Vidar, LummaC2 and others. The result: see exactly which device leaked which credential.
Where
In-app: /app/stealer.
Search modes
- Domain — every credential captured for
github.com. - Email or username — credentials owned by a single user across multiple sites.
- URL — narrow to a specific path (e.g.
github.com/login).
Result fields
| Field | Notes |
|---|---|
| Login URL | The URL the credential was captured from. |
| Username / password | The captured pair. |
| Capture date | When the malware exfiltrated the data. |
| Stealer family | RedLine, Raccoon, Lumma, etc. |
| Victim id | Click to open the victim’s full profile and file tree in victims. |
Pagination
Results paginate at 50 rows per page. Use Prev / Next at the bottom or arrow keys when the table is focused.
Credit cost
- 1 credit per fresh search (6h cache).
- 0 credits for cached results.
- 0 credits to view victim profile from a row.