Consist of five file and each file contains set of name units of same type like Prefix, First Name and so on...
☆20May 20, 2021Updated 4 years ago
Alternatives and similar repositories for List-of-Indian-Names
Users that are interested in List-of-Indian-Names are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Examples of transmitting computer data over radio waves☆12Dec 11, 2017Updated 8 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- A small application that lets you put files on normal non-HiMD minidisc with the help of NetMD☆10Jun 16, 2025Updated 9 months ago
- Validate that a password hasn't been exposed in a data breach.☆13Mar 6, 2020Updated 6 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- A package for accessing InfluxDB from Laravel 5.5+, based on configuration settings.☆13Mar 21, 2019Updated 7 years ago
- Decrypt cookie values in Chrome Sqlite DB on Mac OX S, use Openssl☆18Jun 2, 2015Updated 10 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆12Aug 23, 2021Updated 4 years ago
- SSH brute-forcing tool written in python☆14Feb 10, 2023Updated 3 years ago
- Django password validator that checks for passwords in known data breaches.☆15Feb 6, 2019Updated 7 years ago
- Bluetooth device and service discovery tool that can be used for security assessment and penetration testing☆16Dec 15, 2015Updated 10 years ago
- Lightweight password strength checker that enforces a strong password policy.☆17Jan 3, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Look up Fortune 1000 companies and subsidiaries based on a domain name or email address to get their rankings☆27Jul 16, 2018Updated 7 years ago
- Contributor tools for freeCodeCamp.org's open source codebase on GitHub.☆16Nov 29, 2021Updated 4 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- Find and collect parts of a Keepass master key to recover it in plain text from a memory dump☆20Feb 1, 2024Updated 2 years ago
- Trojan written in C++ for Windows☆20Mar 12, 2024Updated 2 years ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- MD5 collision testing☆17Nov 24, 2024Updated last year
- A program to check the security of personal passwords.☆12Jul 19, 2022Updated 3 years ago
- Website dedicated to all things R and Databases☆15Sep 7, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A generic helm chart that enables you to build pretty much any webservice with a worker, or type of database to associate with in a clean…☆12Mar 28, 2023Updated 3 years ago
- MAPS cloud scanner and response parser for Microsoft Defender research.☆87Feb 19, 2026Updated last month
- HOLM (Hashes.Org Left Manager)☆12Feb 23, 2016Updated 10 years ago
- A web front-end for password cracking and analytics☆16Jan 6, 2019Updated 7 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 3 years ago
- React component for: Have I Been Pwned?☆15Apr 8, 2019Updated 7 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 4 months ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆23Dec 12, 2016Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Windows Bitcoin wallet password recovery tool☆11Nov 30, 2020Updated 5 years ago
- DES Rainbow Table Online Phase☆24Aug 2, 2017Updated 8 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- ☆16Apr 21, 2021Updated 4 years ago
- Quickly look up hashes in your terminal using the HashMob API 🔥☆14Apr 16, 2023Updated 2 years ago
- Java deserialization examples☆13Feb 6, 2019Updated 7 years ago
- Files from Zeronights presentation.☆28Nov 23, 2012Updated 13 years ago