Credential Exposure Removal Guide
This is the fourth step of a four-step process to request, freeze, and remove your personal information from within data broker, credit reporting, and password exposure services.
1: Data Request Guide
2: Credit Freeze Guide
3: Data Removal Guide
4: Credential Exposure Removal Guide
Credential Exposure Removal Resources
We all have credential exposure. Within thousands of database breaches, our email addresses, usernames, passwords, and other sensitive details are being shared across the internet. This has created business opportunities for online services which sell access to our private details. Numerous websites allow anyone to search your email address and see the breach in which it was associated, often along with a partial password. For a few bucks, many sites will show anyone the full password. Let's do something about that. The following steps allow you to remove your email address and exposed credentials from these services.
Have I Been Pwned- Conduct a search of your email address or username at https://haveibeenpwned.com/OptOut.
- Click the link in the email confirmation.
- Choose the "Remove email address completely" option.
- Create a free burner account at https://dehashed.com.
- Conduct a search of your email address or username.
- Click "Request entry removal" link below each result.
- Click the confirmation link within each email.
- Register for a free burner account at https://leakcheck.net.
- Conduct a search of your email address.
- If entries are present , send an email from the exposed address with a written removal request to [email protected].
- Click the link within the confirmation email.
- Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html.
- Search your email address at the first "PSBDMP" option.
- If any results are present, send an email to [email protected] requesting removal.
- Conduct a search of your email address at https://intelx.io.
- Navigate to https://intelx.io/abuse.
- Paste any URLs associated with the found content "Full Data" links.
- Submit request.
- Navigate to the IntelTechniques Breach Tool at https://inteltechniques.com/tools/Breaches.html.
- Search your email address at the first "HudsonRock" option.
- If any results are present, send an email to [email protected] requesting removal. If that fails, use the contact page at https://www.hudsonrock.com/contact.
- Register for a free burner account at https://leak-lookup.com.
- Conduct a search of your email address.
- If entries are present , send an email from the exposed address with a written removal request to [email protected].
- Register for a free burner account at https://hackcheck.io.
- Conduct a search of your email address.
- If entries are present , send an email from the exposed address with a written removal request to [email protected].
- Navigate to https://breachdirectory.org.
- Search your email address.
- If any results are present, begin the removal process at https://breachdirectory.org/deletemydata.
- Navigate to https://leakpeek.com.
- Search your email address.
- If any results are present, send an email to [email protected] requesting removal.
Digital Books
Buy Individual Books
Buy All 9 Books for $150
OSINT Techniques (10th Edition)
OSINT Techniques: Leaks, Breaches & Logs
OSINT Techniques: The Ultimate Virtual Machine
Extreme Privacy (5th Edition)
Extreme Privacy: Mobile Devices
Extreme Privacy: macOS Devices
Extreme Privacy: Linux Devices
Extreme Privacy: VPNs & Firewalls
This Book Was Self-Published
Individual orders available on each book page. PDFs will be immediately available for download after purchase, and an email will also include the download link. You must provide an email address where we can reach you to deliver any updates. This can be a masked, forwarding, or private email provider, but please do not use temporary addresses which you will not be able to control in the future. All PDFs will include a visible and hidden watermark with your order number, but will not include your name, email, or any other personally identifying text. All orders are delivered via SendOwl, and purchasing details are submitted through our own Stripe account. We do not store your credit card information. Due to the nature of instant delivery of digital products, all sales are final.
Privacy Book
Our latest (5th Edition) book on Extreme Privacy is now available. Click HERE for details.