How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.
☆153Jan 27, 2021Updated 5 years ago
Alternatives and similar repositories for is_my_password_pwned
Users that are interested in is_my_password_pwned are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Remote Post Breach Tool via Telegram☆135Mar 13, 2018Updated 8 years ago
- ☆59May 1, 2019Updated 6 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Bash scripts to help setup port redirects with iptables☆16Apr 22, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Linux Memory Cryptographic Keys Extractor☆242May 22, 2023Updated 2 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 8 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆143Mar 12, 2018Updated 8 years ago
- CTF Finals☆17Nov 14, 2017Updated 8 years ago
- MSDAT: Microsoft SQL Database Attacking Tool☆993Aug 1, 2023Updated 2 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Modern tactical exploitation toolkit.☆859Mar 9, 2026Updated last month
- UAC 0Day all day!☆57Aug 15, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Phishing on Twitter☆252Jun 21, 2018Updated 7 years ago
- 娜迦DEX文件修复程序☆25Aug 3, 2017Updated 8 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 8 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆468Sep 23, 2017Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Various Tools and Docker Images☆280Apr 26, 2025Updated 11 months ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- ☆526Aug 11, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Checks Firefox saved passwords against known data leaks using the Have I Been Pwned API.☆90Jun 29, 2022Updated 3 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- A code demonstrating CVE-2018-0886☆269Aug 14, 2020Updated 5 years ago
- SSL VPN Rce☆52Aug 27, 2019Updated 6 years ago
- A Privacy-Conscious, DNS-over-HTTP-Enabled, Blacklist-Incorporating SOCKS5 Proxy☆30Feb 28, 2019Updated 7 years ago
- CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script☆140Jul 20, 2018Updated 7 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- An information gathering tool to collect git commit emails in version control host services☆152May 5, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆88Apr 24, 2018Updated 7 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- Publicly released tools/plugins from PPP for DEFCON 25 CTF Finals☆144Oct 28, 2018Updated 7 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Mar 17, 2018Updated 8 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- intercepting kali router☆443Aug 31, 2017Updated 8 years ago
- Basic examples of double free exploitation/etc functionality in glibc/jemalloc/tcmalloc☆61Jul 1, 2017Updated 8 years ago