[{"data":1,"prerenderedAt":144},["ShallowReactive",2],{"packages":3},[4,72],{"id":5,"title":6,"body":7,"category":21,"changelog":22,"description":13,"discontinued":29,"extension":30,"externalServices":31,"faqs":39,"features":46,"image":35,"installation":52,"license":56,"meta":57,"navigation":29,"path":58,"requirements":59,"screenshots":35,"seo":62,"shortDescription":63,"stem":64,"tags":65,"version":24,"__hash__":71},"packages\u002Fpackages\u002Fpawnhub.md","Pawnhub",{"type":8,"value":9,"toc":17},"minimark",[10,14],[11,12,13],"p",{},"Pawnhub is a lightweight CLI tool and Node.js package that checks whether an email address appears in publicly disclosed data breach records by querying the Have I Been Pwned service.",[11,15,16],{},"Note: This project is discontinued due to changes in the Have I Been Pwned API policy requiring paid API keys.",{"title":18,"searchDepth":19,"depth":19,"links":20},"",2,[],"NPM Package",[23],{"version":24,"changes":25},"1.0.0",[26,27,28],"Initial release","CLI tool for checking emails against HIBP database","Built with Axios HTTP client",true,"md",{"name":32,"operator":33,"purpose":34,"frontendUrl":35,"verifyUrl":35,"serviceUrl":36,"termsUrl":37,"privacyUrl":38},"Have I Been Pwned","Troy Hunt","Email data breach lookup",null,"https:\u002F\u002Fhaveibeenpwned.com","https:\u002F\u002Fhaveibeenpwned.com\u002FAPI\u002Fv3#Acceptable","https:\u002F\u002Fhaveibeenpwned.com\u002FPrivacy",[40,43],{"question":41,"answer":42},"Is this project still maintained?","No — the project is discontinued because the Have I Been Pwned API now requires a paid API key for access.",{"question":44,"answer":45},"Can I use it as a library in my Node.js project?","Yes, you can import the package and use it programmatically in addition to the CLI.",[47,48,49,50,51],"Check any email address against the Have I Been Pwned database","Simple CLI interface — just run pawnhub email@example.com","Can be used as a CLI tool or imported as a Node.js module","Built with Axios for HTTP requests","Lightweight with minimal dependencies",[53,54,55],"Install globally: npm install -g @perlatsp\u002Fpawnhub","Or install locally: npm install @perlatsp\u002Fpawnhub","Run from terminal: pawnhub admin@test.com","MIT",{},"\u002Fpackages\u002Fpawnhub",[60,61],"Node.js 8+","npm or yarn",{"title":6,"description":13},"A simple NPM package utilizing the Have I Been Pwned API to check if an email has been found in public data breaches.","packages\u002Fpawnhub",[66,67,68,69,70],"node.js","security","cli","haveibeenpwned","data-breach","FqhK9bAUj3F81prmNQtwDcaReJAVIN1XLPnVtykO_w0",{"id":73,"title":74,"body":75,"category":85,"changelog":86,"description":79,"discontinued":29,"extension":30,"externalServices":35,"faqs":94,"features":104,"image":112,"installation":113,"license":56,"meta":119,"navigation":29,"path":120,"requirements":121,"screenshots":125,"seo":133,"shortDescription":134,"stem":135,"tags":136,"version":24,"__hash__":143},"packages\u002Fpackages\u002Fpk-motd.md","pk-motd",{"type":8,"value":76,"toc":83},[77,80],[11,78,79],{},"pk-motd replaces the default Message of the Day on Linux servers with an enhanced dashboard that displays real-time system information when you SSH into your server.",[11,81,82],{},"Designed for LEMP stacks (Linux, Nginx, MySQL, PHP) but works on any Linux server. Shows everything you need at a glance: system health, running services, disk usage, SSL certificate expiry, and even a developer joke to start your session.",{"title":18,"searchDepth":19,"depth":19,"links":84},[],"Shell Script",[87],{"version":24,"changes":88},[26,89,90,91,92,93],"System info dashboard (hostname, uptime, load, memory, IPs)","Disk usage visualization","Service status monitoring","SSL certificate expiry tracking","One-line installer script",[95,98,101],{"question":96,"answer":97},"Can I customize which services are monitored?","Yes — the list of monitored services is configurable in the script. You can add or remove services like Fail2Ban, MySQL, PHP-FPM, NGINX, and UFW.",{"question":99,"answer":100},"Does it work on non-LEMP servers?","Yes, it works on any Linux server. Just customize the service monitoring list to match your stack.",{"question":102,"answer":103},"Will it break my existing MOTD?","No — it adds a new script to \u002Fetc\u002Fupdate-motd.d\u002F. You can disable the default MOTD files if you want a clean look.",[105,106,107,108,109,110,111],"System info: hostname, uptime, load average, process count, memory usage, IP addresses","Visual disk usage graph","Available system updates count","Service status monitoring for Fail2Ban, MySQL, PHP-FPM, NGINX, UFW (customizable)","SSL certificate tracking with expiration dates","Active SSH sessions display","Developer jokes on login","\u002Fimages\u002Fplugins\u002Fpk-motd\u002Fpk-motd-updated.png",[114,115,116,117,118],"Quick install: wget -O - https:\u002F\u002Fraw.githubusercontent.com\u002Fperlatsp\u002Fpk-motd\u002Fmain\u002Finstall.sh | bash","Or manually download custom-welcome-message.txt from the repository","Rename and place it in \u002Fetc\u002Fupdate-motd.d\u002F","Set executable permissions: chmod 755 \u002Fetc\u002Fupdate-motd.d\u002Fcustom-welcome-message","Optionally disable default MOTD files: chmod -x \u002Fetc\u002Fupdate-motd.d\u002F*",{},"\u002Fpackages\u002Fpk-motd",[122,123,124],"Linux server (Ubuntu\u002FDebian recommended)","Bash shell","SSH access",[126,130],{"url":127,"alt":128,"label":129},"\u002Fimages\u002Fplugins\u002Fpk-motd\u002Fdefault-motd.png","Default Linux MOTD","Default",{"url":112,"alt":131,"label":132},"pk-motd enhanced MOTD dashboard","With pk-motd",{"title":74,"description":79},"Custom MOTD scripts for Linux servers — replaces the default SSH login message with a dashboard showing system metrics, service status, SSL certs, and disk usage.","packages\u002Fpk-motd",[137,138,139,140,141,142],"linux","shell","server","motd","sysadmin","lemp","KNeLBo5JsAot7ELZLKnpLpoQSqmdga0oOLYGh01WpQU",1777945231593]