A simple tool to check a bunch of email addresses against the Have I Been Pwned API.
☆68Jul 18, 2014Updated 11 years ago
Alternatives and similar repositories for hibp
Users that are interested in hibp are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ruby gem to check to see if an email address is on http://haveibeenpwned.com☆17Oct 26, 2017Updated 8 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- Probe a web server for common files and endpoints that are useful for gathering information or gaining a foothold.☆23May 20, 2014Updated 11 years ago
- A collection of Nmap NSE scripts that I made.☆31Jan 14, 2013Updated 13 years ago
- recon-ng Maltego local transform pack☆39Dec 10, 2013Updated 12 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Start here!☆11Feb 19, 2020Updated 6 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- A web application hacker's toolbox. Base64 encoding/decoding, URL encoding/decoding, MD5/SHA1/SHA256/HMAC hashing, code deobfuscation, fo…☆53Aug 13, 2024Updated last year
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- Easily create a swapfile on Ubuntu 16 and CentOS 7 hosts.☆16Dec 30, 2016Updated 9 years ago
- ☆10Jun 6, 2022Updated 3 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆25Jan 9, 2017Updated 9 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆169Oct 1, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆18Jun 8, 2018Updated 7 years ago
- RubyGem: Logger for systemd-journal☆16Mar 30, 2022Updated 4 years ago
- ☆15Jul 7, 2022Updated 3 years ago
- Control your VLC with your IRC☆11Apr 1, 2017Updated 9 years ago
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- Data analysis and OSINT framework for Twitter☆414Oct 18, 2020Updated 5 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- CLI tool to analyze APKs☆42Mar 28, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆27Apr 16, 2017Updated 8 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- A web spider for shodan.io without using the Developer API.☆33Jan 4, 2018Updated 8 years ago
- An HTML Preprocessor for Web Typography, based on Typeset.js☆16Nov 18, 2015Updated 10 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Infinite State's first album.☆13Jul 28, 2016Updated 9 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Jan 30, 2018Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Snort rules☆35Nov 20, 2018Updated 7 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Index and Search Your Private PDF Collection☆18Jan 16, 2016Updated 10 years ago
- ☆21Jan 2, 2026Updated 3 months ago
- Hunting cryptonote-related miners☆23Nov 3, 2020Updated 5 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Jun 28, 2025Updated 9 months ago