Instead of downloading risky files, use legitimate security tools to see if your own email is part of a breach:
: Possessing or sharing unauthorized credentials is illegal under laws like the Computer Fraud and Abuse Act (CFAA) or GDPR . Even downloading them "just to look" can expose you to legal trouble.
: This is the single most effective defense. Even if an attacker has your correct password from a combolist, they cannot get past the second factor.
: The industry standard for checking if your email or phone number has been exposed in a known data breach.