terencechow / PwnedPasswordsLinks
PwnedPasswords as a Service
☆25Updated 6 years ago
Alternatives and similar repositories for PwnedPasswords
Users that are interested in PwnedPasswords are comparing it to the libraries listed below
Sorting:
- Official python API for Phish.AI public and private API to detect zero-day phishing websites☆174Updated 7 years ago
- Web on top of any protocol☆113Updated 5 years ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆111Updated last year
- Tooling to retrieve data from Axon2 Body Cams☆48Updated 4 years ago
- IoT device indexer and search engine.☆60Updated 6 years ago
- Think of Local sheriff as a recon tool in your browser (WebExtension). While you normally browse the internet, Local Sheriff works in the…☆310Updated 3 years ago
- Smart piping of command output to email for alerting.☆20Updated 5 years ago
- A Linux shell script to improve your privacy online☆86Updated 9 years ago
- Passwordless Authentication Wallet (PAW) is key-based authentication for the web. The library helps manage identities, their associated p…☆40Updated 6 years ago
- Markov Chain Twitter Bot generator☆115Updated 3 years ago
- Harden your Chrome browser via enterprise policy.☆294Updated 2 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆17Updated 4 years ago
- A Twitter bot which tweets Magic: the Gathering cards with appropriate GIFs superimposed onto them.☆213Updated 8 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆108Updated 6 years ago
- Googol Game or "You should learn when to quit". A JavaScript game.☆49Updated 6 years ago
- See the people Facebook thinks you know☆197Updated 2 years ago
- See if your passwords in pass has been breached.☆136Updated 6 years ago
- A light version of Tor portable to the browser☆120Updated 5 years ago
- Cloud security monitoring tool and framework☆222Updated last year
- Simple interactive breakpoint library with with automatic variable injection.☆61Updated 7 years ago
- A library for classifying strings as potential secrets.☆64Updated 4 years ago
- Easily create Tor hidden services with one command.☆58Updated 9 years ago
- ☆65Updated 5 years ago
- A Gamma muxing tool☆55Updated 6 years ago
- Run a personal VPN in the cloud. And rotate it regularly.☆146Updated last year
- What if you could use bash from a filesystem?☆64Updated 6 years ago
- ☆95Updated 6 years ago
- Extract and decompose (fuzzy) URLs (including emails, which are conceptually a part of URLs) in texts with Area-Pattern-based modularity☆355Updated 10 months ago
- How to "encourage" your children to use the internet more for learning using Pi-hole 5.0☆65Updated 5 years ago