detroitenglish / pw-pwnage-cfworker
Deploy a Cloudflare Worker to sanely score users' new passwords with zxcvbn AND check for matches against haveibeenpwned's 10+ billion breached accounts
☆155Updated 2 years ago
Alternatives and similar repositories for pw-pwnage-cfworker
Users that are interested in pw-pwnage-cfworker are comparing it to the libraries listed below
Sorting:
- Deploy your own secure API to estimate password strength and check haveibeenpwned for known matches - HTTPS by force, server not required…☆59Updated 2 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 5 years ago
- A simple JavaScript library to help you protect your users' passwords☆149Updated 2 years ago
- Build your own private VPN server. OpenVPN, Scramblesuit and DNS up in less then 5 minutes☆78Updated 6 years ago
- A tiny web auditor with strong opinions.☆589Updated 3 months ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- Docker container for creating the phishing sites using Blackeye☆137Updated 2 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆141Updated 7 years ago
- INACTIVE - Collection of Tools & Procedures for double checking GitHub configurations☆138Updated last year
- Tracking the trackers. Draw connections between scripts and domains on website.☆14Updated 3 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 2 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆106Updated 8 months ago
- Seamlessly spy on SSH session like it is your tty☆350Updated 7 years ago
- honeyλ - a simple, serverless application designed to create and monitor fake HTTP endpoints (i.e. URL honeytokens) automatically, on top…☆517Updated 6 years ago
- Harden your Chrome browser via enterprise policy.☆285Updated 2 years ago
- Open source tool to help you build a valid SSL certificate chain.☆367Updated 5 months ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Various Tools and Docker Images☆280Updated 3 weeks ago
- ☆352Updated 3 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆680Updated 5 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- Think of Local sheriff as a recon tool in your browser (WebExtension). While you normally browse the internet, Local Sheriff works in the…☆308Updated 2 years ago
- A wanna be swiss army knife for data encryption, exfiltration and covert communication.☆538Updated 2 years ago
- A service for monitoring whether chat apps etc. leak URLs☆56Updated 6 years ago
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆493Updated 5 months ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆102Updated 7 years ago
- ☆143Updated 5 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago