Ready to produce customised photos & video for your brand?
Want to get paid to create visual content?
Get access to paid work opportunities with global brands. Register your interest by sharing some examples of your work.
Frequently used by specific data brokers or groups (like "New World Order") to brand their curated sets of leaked credentials or "combolists."
In some cases, these archives contain logs from "stealer" malware (like RedLine or Raccoon) which include browser cookies, autofill data, and system snapshots. Safety and Security Risks NWOxxxCOLLECTIONZip422zip
Archives from these sources are frequently "backdoored" with trojans or info-stealers intended to infect the person downloading the data. Frequently used by specific data brokers or groups
Text files containing credentials in the email:password or username:password format. Data specific to certain regions, industries, or websites
Data specific to certain regions, industries, or websites that the uploader has grouped together.
If you are searching for this because you believe your data is in it, it is safer to use reputable breach check services like Have I Been Pwned rather than interacting with the raw files. Recommended Actions
Possessing or distributing leaked personal data can carry legal consequences depending on your jurisdiction.
Get access to paid work opportunities with global brands. Register your interest by sharing some examples of your work.

Find out how we can help you deliver better performance today and a stronger brand tomorrow