terencechow / PwnedPasswordsView external linksLinks
PwnedPasswords as a Service
☆25Apr 23, 2019Updated 6 years ago
Alternatives and similar repositories for PwnedPasswords
Users that are interested in PwnedPasswords are comparing it to the libraries listed below
Sorting:
- Software that tells you when the price of a crypto has gone down.☆23Jan 6, 2023Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 2 months ago
- Generate a Employee monthly payslip download as pdf and send to their mail☆10Sep 18, 2022Updated 3 years ago
- ☆10Aug 4, 2022Updated 3 years ago
- ☆11Mar 15, 2017Updated 8 years ago
- 🐍 datastore-orm wraps google-cloud-datastore in a lightweight ORM and helps you easily migrate away from NDB☆11Dec 26, 2024Updated last year
- This is a Snake Game built with HTML5 and Javascript☆10Nov 16, 2022Updated 3 years ago
- Solving CAPTCHA with Image Classification☆10Mar 13, 2025Updated 11 months ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 10 years ago
- Git-native prompt management and testing framework for production LLM workflows☆18Jul 2, 2025Updated 7 months ago
- python module for doing colour detection☆11Dec 24, 2017Updated 8 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Django middleware to log 400 level errors to Sentry☆11Oct 20, 2017Updated 8 years ago
- ☆11Oct 30, 2019Updated 6 years ago
- Locate the Google Chrome browser on your system☆10Mar 17, 2015Updated 10 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Where should I deploy my Code on Google Cloud Platform?☆10Nov 21, 2019Updated 6 years ago
- Carpet fractal genetic algorithm☆13Oct 4, 2017Updated 8 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Pipe stuff to Neo4j☆10Jun 4, 2020Updated 5 years ago
- Automated STIG Benchmark Compliance Remediation for Postgresql-9.x with Ansible☆12Apr 14, 2023Updated 2 years ago
- Use your vim settings anywhere☆164Oct 27, 2014Updated 11 years ago
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- Library to standardize ERC20 methods calls☆13Jan 24, 2023Updated 3 years ago
- ☆10Apr 19, 2019Updated 6 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- Generates GeoJSON for website map☆11Sep 23, 2018Updated 7 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- Share secrets encrypted☆14Feb 3, 2026Updated last week
- Hashicorp Boundary Helm Chart☆12Dec 15, 2023Updated 2 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- Invest smarter?☆15Jul 12, 2018Updated 7 years ago
- Sample code for locating Particle Photons on your local network for direct client-server communication☆11Aug 4, 2016Updated 9 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Simple Golang JWT Bruteforcer 2☆10May 25, 2021Updated 4 years ago
- WAyereless Site SUrveying Program☆12Feb 9, 2016Updated 10 years ago
- Tool scan EternalBlue by golang☆21Sep 13, 2019Updated 6 years ago
- Django Happy Urls☆44Apr 4, 2014Updated 11 years ago