Learned how password leak databases (like Have I Been Pwned) work. Used Python’s requests library to access the Pwned Passwords API. Implemented a local, privacy-safe password checker. Compared SHA-1 ...