Have I Been PwnedHave I Been Pwned

Have I Been Pwned Usage Statistics · Download List of All Websites using Have I Been Pwned

Domain ownership verification for haveibeenpwned provides site owners with access to reports of email addresses associated with there domain found in data breaches.

Frameworks

ASP.NETASP.NET

ASP.NET Usage Statistics · Download List of All Websites using ASP.NET

ASP.NET is a web application framework marketed by Microsoft that programmers can use to build dynamic web sites, web applications and XML web services. It is part of Microsoft's .NET platform and is the successor to Microsoft's Active Server Pages (ASP) technology.

JavaScript Libraries and Functions

jQueryjQuery

jQuery Usage Statistics · Download List of All Websites using jQuery

JQuery is a fast, concise, JavaScript Library that simplifies how you traverse HTML documents, handle events, perform animations, and add Ajax interactions to your web pages. jQuery is designed to change the way that you write JavaScript.

JavaScript Library

Email Hosting Providers

Amazon SESAmazon SES

Amazon SES Usage Statistics · Download List of All Websites using Amazon SES

Amazon Simple Email Service (Amazon SES) is a scalable, bulk, transactional email-sending service for businesses and developers.

Transactional Email

SPFSPF

SPF Usage Statistics · Download List of All Websites using SPF

The Sender Policy Framework is an open standard specifying a technical method to prevent sender address forgery.

DMARCDMARC

DMARC Usage Statistics · Download List of All Websites using DMARC

A technical specification created by a group of organizations that want to help reduce the potential for email-based abuse

DMARC

SSL Certificates

SSL by DefaultSSL by Default

SSL by Default Usage Statistics · Download List of All Websites using SSL by Default

The website redirects traffic to an HTTPS/SSL version by default.

Name Server

DNSSECDNSSEC

DNSSEC Usage Statistics · Download List of All Websites using DNSSEC

DNSSEC strengthens DNS authentication by using digital signatures based on public key cryptography.

Operating Systems and Servers