HaveIBeenPwned / ux-rebuildLinks
A repository to collaborate on the UX rebuild of Have I Been Pwned
☆64Updated 3 months ago
Alternatives and similar repositories for ux-rebuild
Users that are interested in ux-rebuild are comparing it to the libraries listed below
Sorting:
- A project to rapidly extract all email addresses from any files in a given path☆189Updated 2 months ago
- ☆31Updated 4 years ago
- 🛡 Collection of pages for testing various privacy and security features of browsers and browser extensions.☆90Updated this week
- Runs distributed Badger Sett scans on Digital Ocean.☆26Updated 2 weeks ago
- Deliberately making password creation a true hell☆160Updated 2 years ago
- My Privacy DNS #Matrix lists for blacklisting☆142Updated 2 months ago
- Kubernetes configuration files for SponsorBlock production server deployment☆26Updated last year
- Calculates metrics about the current state of the tldr pages☆19Updated this week
- ☆35Updated 2 years ago
- 🛡️📧 Protect e-mails against spam and scraping bots☆33Updated 10 months ago
- A collection of sites and services that support passkeys.☆170Updated last week
- 💽 A quick tool for determining and comparing approximate capacity, speed and fault tolerance of different RAID configurations☆31Updated last year
- FIDO2 Passkey directory☆31Updated 2 months ago
- Own your data☆116Updated last week
- Audited, Open-Source Email Aliasing Service☆38Updated this week
- My attempt at creating an open-source licence that works on good faith, specifically crafted for adblock filterlist maintainers.☆15Updated 4 years ago
- Welcome to the Meta Threat Research Indicator Repository, a dedicated resource for the sharing of Indicators of Compromise (IOCs) and oth…☆169Updated 6 months ago
- Adblock filters for Dutch websites made for uBlock Origin☆23Updated last year
- Landing page for Global Privacy Control (GPC)☆12Updated 3 weeks ago
- Worldline Yomani XR Flash Unpacker https://stefan-gloor.ch/yomani-hack☆46Updated last year
- AMI is a web application that helps people to create legal requests for copies of their personal information from data operators.☆31Updated 6 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆144Updated last year
- A directory of information for you to acknowledge the amount of data that web services gather from you.☆27Updated 2 years ago
- For monitoring SimpleLogin uptime☆22Updated this week
- ☆55Updated 2 years ago
- List of useful things☆81Updated this week
- A collection of branded assets to be used☆12Updated 6 months ago
- A guide to downloading all public DDoSecrets releases via torrent☆73Updated last year
- Static website for security.txt.☆68Updated 2 months ago
- Malicious Domain Blocklist, suitable for use in Pi-hole or similar applications which accept domain based lists..☆22Updated 2 years ago