detroitenglish / pw-pwnage-cfworker
Deploy a Cloudflare Worker to sanely score users' new passwords with zxcvbn AND check for matches against haveibeenpwned's 10+ billion breached accounts
☆155Updated 2 years ago
Alternatives and similar repositories for pw-pwnage-cfworker:
Users that are interested in pw-pwnage-cfworker are comparing it to the libraries listed below
- Deploy your own secure API to estimate password strength and check haveibeenpwned for known matches - HTTPS by force, server not required…☆59Updated 2 years ago
- A simple JavaScript library to help you protect your users' passwords☆149Updated 2 years ago
- Build your own private VPN server. OpenVPN, Scramblesuit and DNS up in less then 5 minutes☆77Updated 6 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆110Updated 5 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆15Updated 3 years ago
- Various Tools and Docker Images☆279Updated 6 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆102Updated 5 years ago
- Interface to manage and centralize Google Alert information☆232Updated 2 years ago
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- Local Privilege Escalation☆206Updated 7 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 5 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆516Updated 6 years ago
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆138Updated 9 months ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 2 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- ☆25Updated 7 years ago
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆490Updated 2 months ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆319Updated 7 years ago
- Open source tool to help you build a valid SSL certificate chain.☆363Updated 2 months ago
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆103Updated 7 years ago
- A tiny web auditor with strong opinions.☆584Updated 3 weeks ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆108Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆159Updated 4 years ago
- A mostly-serverless distributed hash cracking platform☆803Updated 10 months ago
- Discover target social media profiles☆81Updated 2 years ago
- A UNIX security auditing tool based on several security frameworks☆312Updated 6 months ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 7 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆469Updated 2 years ago