XposedOrNot: Open-source API for real-time alerts on domain data breaches. Protects your online identity with user-friendly monitoring and immediate notifications. Ideal for personal and professional use.
☆72Feb 21, 2026Updated last week
Alternatives and similar repositories for XposedOrNot-API
Users that are interested in XposedOrNot-API are comparing it to the libraries listed below
Sorting:
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆37Jul 27, 2024Updated last year
- No-nonsense data breach search interface☆11Jul 20, 2024Updated last year
- A transform to show the latest copy of the website from the Wayback Machine☆17Nov 25, 2014Updated 11 years ago
- BaseQuery is an OSINT tool used import email and password data files from security breaches, storing them in a way that is extremely quic…☆17Feb 9, 2019Updated 7 years ago
- Implement DeepWarp algorithm for gaze manipulation☆14Feb 11, 2018Updated 8 years ago
- PyCes (Python Code Scanner) - Enhanced Security Static Analysis Tool for Python☆11Apr 18, 2019Updated 6 years ago
- SOCMINT tool to find social media accounts.☆32Sep 12, 2024Updated last year
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- Enhanced QDLink without handbreak detection and many other restrictions.☆11Apr 13, 2023Updated 2 years ago
- Shodan Dorks for Advanced OSINT☆27Dec 19, 2024Updated last year
- A password cracking tool to try out different password cracking methods for security testing☆10Jul 23, 2021Updated 4 years ago
- Interactive terminal based tool to configure a Raspberry Pi into a transparent Wifi based proxy with traffic tunnelling support☆31Feb 19, 2024Updated 2 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- ☆14Mar 12, 2023Updated 2 years ago
- ☆10Jul 10, 2021Updated 4 years ago
- Touti Cracker is a cross-platform ethical hacking toolkit for educational purposes, featuring password cracking, WiFi auditing, and rever…☆49Jan 9, 2026Updated last month
- pongoOS☆10Feb 15, 2024Updated 2 years ago
- Start here!☆11Feb 19, 2020Updated 6 years ago
- Bypass Xiaomi RSA 256 EDL Auth☆13Sep 2, 2025Updated 5 months ago
- Discord RAT made in powershell (open source)☆12Jul 16, 2025Updated 7 months ago
- Competition Infrastructure Management☆13Oct 16, 2025Updated 4 months ago
- Python3 script to dump breach data from Dehashed☆42Jun 30, 2025Updated 8 months ago
- ☆20Feb 21, 2026Updated last week
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- A simple led indicator for PyQt5☆11Sep 15, 2017Updated 8 years ago
- ADB Usage Complete / ADB 用法大全☆12Jan 17, 2022Updated 4 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago
- MagicMirror plug-in module that displays a table of MySQL SELECT results☆10Jan 5, 2026Updated last month
- Senpai is a Zsh clean prompt theme for Devops☆12Aug 5, 2019Updated 6 years ago
- PyQt thread which overlays the translucent loading screen with label on the whole window like some generic application loading screen.☆12Feb 4, 2022Updated 4 years ago
- Combined InstantID🔥 and FouriScale to generate high resolution image!☆11Apr 3, 2024Updated last year
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Bot to bypass instagram block feature☆10Jun 21, 2017Updated 8 years ago
- Quickly Access and Infiltrate ADB Devices With Shodan API☆11Jul 27, 2025Updated 7 months ago
- Step by step guide to deploy any machine learning prediction web API using Flask, Gunicorn, NGINX containerised in Docker on GCP Kubernet…☆12Dec 8, 2022Updated 3 years ago
- This repository provides a Python package so everyone can easily try Computer Use of ClaudeAI.☆10Nov 1, 2024Updated last year
- Implementing ISO/IEC 27001:2022, by EC-Council☆15Feb 20, 2026Updated last week
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 7 years ago