Consist of five file and each file contains set of name units of same type like Prefix, First Name and so on...
☆20May 20, 2021Updated 4 years ago
Alternatives and similar repositories for List-of-Indian-Names
Users that are interested in List-of-Indian-Names are comparing it to the libraries listed below
Sorting:
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Archive of Metasploit Framework v1 (Perl)☆13Sep 29, 2014Updated 11 years ago
- Examples of transmitting computer data over radio waves☆12Dec 11, 2017Updated 8 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- A small application that lets you put files on normal non-HiMD minidisc with the help of NetMD☆10Jun 16, 2025Updated 9 months ago
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- A command line tool to brute-force websites using cookies crafted with flask-unsign.☆12Apr 6, 2023Updated 2 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- A package for accessing InfluxDB from Laravel 5.5+, based on configuration settings.☆13Mar 21, 2019Updated 6 years ago
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆12Aug 23, 2021Updated 4 years ago
- SSH brute-forcing tool written in python☆14Feb 10, 2023Updated 3 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated last month
- Lightweight password strength checker that enforces a strong password policy.☆17Jan 3, 2023Updated 3 years ago
- This batch script reveal all Wi-Fi passwords saved in your computer.☆18Apr 10, 2022Updated 3 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- A program to check the security of personal passwords.☆12Jul 19, 2022Updated 3 years ago
- Website dedicated to all things R and Databases☆15Sep 7, 2022Updated 3 years ago
- A generic helm chart that enables you to build pretty much any webservice with a worker, or type of database to associate with in a clean…☆12Mar 28, 2023Updated 2 years ago
- peer to peer database☆21May 29, 2020Updated 5 years ago
- ☆24Oct 31, 2023Updated 2 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 3 years ago
- This is a nice and simple wrapper in Go over the scrypt password based key derivation algorithm.☆25Nov 3, 2022Updated 3 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- React component for: Have I Been Pwned?☆15Apr 8, 2019Updated 6 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- This python script streamlines the process required to encode and decode files to cassette tapes using an old dos program called KCS (CUT…☆15Apr 26, 2023Updated 2 years ago
- A Windows Bitcoin wallet password recovery tool☆11Nov 30, 2020Updated 5 years ago
- DES Rainbow Table Online Phase☆24Aug 2, 2017Updated 8 years ago
- ☆16Apr 21, 2021Updated 4 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆13Apr 16, 2023Updated 2 years ago
- Files from Zeronights presentation.☆28Nov 23, 2012Updated 13 years ago
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago