You can use this site to compare the domains listed in your password manager (such as LastPass and 1Password) with those contained in the Cit0day Breach.
To check for breached credentials, please perform the following actions:
1. Export your data from your password manager to a CSV (.csv) file.
2. Open the exported CSV file using Microsoft Excel (or another similar tool). Remove the column labelled "passwords" and any other columns containing sensitive data and save the file again as a CSV. Make sure not to delete the "url" column. If the column containing the URLs of the entry is named something different than "url", change that column to "url". Delete the original file containing the passwords and empty your trash.
Note: Your CSV file will be processed locally in the browser and no password data from the CVS file will leave your computer while using this tool. However, you should NEVER use a tool like this without first stripping out your passwords and other sensitive data, even if the website tells you it is ok. Please use Excel (or another tool) to remove the column of passwords that appear in the exported CSV file and make sure you save it as a CSV file again.
3. Use the button below and select the edited CSV (which does not contain any passwords).
4. After you select the file, the browser will check to see if any domains in your password manager match the list of breached domains. If there are any breached domains they will appear in a table below. For each match in the table, navigate to that website and change your password immedietely. Once you're done with this tool, delete the exported CSV file and the version you modified and empty your trash.
|"Choose File" Above||-|