
Your best friend in credential reuse attacks.
Cr3dOv3r simply you give it an email then it does two simple jobs (but useful) :
Search for public leaks for the email and if it any, it returns with all available details about the leak (Using hacked-emails...