adewes / have-i-been-bloomed
A Bloom filter & Golang server for checking passwords against the "Have I Been Pwned 2.0" password database.
☆52Updated 3 years ago
Alternatives and similar repositories for have-i-been-bloomed:
Users that are interested in have-i-been-bloomed are comparing it to the libraries listed below
- DNS Firewall Enforcer☆49Updated 6 years ago
- Discover SPOF in DNS dependency graphs☆66Updated 7 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- Description format for APT repositories and its Python implementation using Aptly☆36Updated 4 years ago
- Secure storage for cryptographic secrets, modeled after sudo☆78Updated 5 years ago
- DHCP client disclosing less identifying information.☆61Updated 4 years ago
- YubiHSM2-backed signing server☆209Updated 6 years ago
- ☆66Updated 4 years ago
- TLS Client Certificate Authentication and its Privacy Implications☆16Updated 7 years ago
- Extensions and experiments.☆64Updated 2 years ago
- Minimal DNS-Over-HTTPS Server☆129Updated 7 years ago
- User-space deniable data encryption client.☆94Updated last year
- A package for handling ssh certificates☆45Updated 3 years ago
- Screenshot of how GMail classified PayPal security message as spam☆16Updated 6 years ago
- A backup system, similar to TimeMachine. Supports encrypted, incremental backups, with filesystem based recovery.☆59Updated this week
- Python utils library and tools (verify-scts, ctloglist, ...) for Certificate Transparency.☆36Updated 2 years ago
- Mentally computable verification codes for email aliases implemented as a postfix tcp table; uses asyncio.☆42Updated 7 months ago
- Lafayette is a system to store various email abuse reports sent in ARF.☆75Updated 11 years ago
- A network sniffer that logs all DNS server replies☆35Updated 11 years ago
- Anti-Abuse for servers at authentication time☆127Updated last week
- Create and manage chroot/jail environments☆52Updated last year
- Architecture - design and implementation of the D4 project architecture☆16Updated 3 years ago
- USBLockout monitors your user session and triggers Grsecurity Deny New USB feature.☆53Updated 7 years ago
- Hardened debian linux baseimage for Docker.☆40Updated last year
- Tools for quantifying error in RTT-based trilateration/geolocation techniques☆20Updated 6 years ago
- DNS Over HTTPS proxy, server and query programs☆23Updated 3 weeks ago
- Like Tor2Web, but not just HTTP ( using IPv6 )☆125Updated 4 years ago
- NAS (Network Attached Storage) related tools☆55Updated this week
- Random tools to perform Certificate Transparency-related stuff. Unmaintained and maybe broken☆27Updated 7 years ago
- Tool to convert Neustar's GeoPoint data to Maxmind's GeoIP database format for ease of use.☆20Updated 6 years ago