Unit221B / RussianLinks
Russian Keyboard Registry Script
☆113Updated 4 years ago
Alternatives and similar repositories for Russian
Users that are interested in Russian are comparing it to the libraries listed below
Sorting:
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆119Updated last month
- Parse your LastPass vault and export to CSV files☆123Updated last year
- Harden your Chrome browser via enterprise policy.☆294Updated 2 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆374Updated 4 years ago
- A Passive SSH back-end and scanner.☆104Updated 6 months ago
- ☆356Updated 3 years ago
- Implementing the CIS Critical Controls (almost) for Free☆87Updated 3 years ago
- edgedressing leverages a Windows "feature" in order to force a target's Edge browser to open. This browser is then directed to a URL of …☆51Updated last year
- RPZ Zone Files to Block DNS-over-HTTPS☆90Updated 4 years ago
- Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo☆39Updated 4 years ago
- ☆261Updated 7 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆144Updated 2 years ago
- Find and notify users in your Active Directory with weak passwords☆103Updated 4 years ago
- A collection of online trackers, advertising networks, telemetry collectors and general 'we like to watch' lists for you to use to get be…☆113Updated 4 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Updated 2 months ago
- Tools and scripts by Arctic Wolf☆70Updated 5 months ago
- A browser extension and API server for detecting corporate password use on external websites☆94Updated 3 months ago
- Mike Lindell's cybersymposium files☆48Updated 4 years ago
- Files vetted, and approved for public release☆55Updated 2 years ago
- Open source solution to check prospective AD passwords against previously breached passwords☆87Updated 6 years ago
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆277Updated this week
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 4 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 4 months ago
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 4 years ago
- OS image for the PiRogue based on Debian 12☆161Updated last year
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- A collection of datasets☆42Updated 3 years ago
- ☆192Updated last month
- Repository with all the Solarwinds Vulnerability information I've been tracking and using for communications, review, and technical under…☆25Updated 5 years ago
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆100Updated 6 years ago