Unit221B / Russian
Russian Keyboard Registry Script
☆105Updated 3 years ago
Alternatives and similar repositories for Russian
Users that are interested in Russian are comparing it to the libraries listed below
Sorting:
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆122Updated 10 months ago
- A Passive SSH back-end and scanner.☆102Updated 2 months ago
- ☆100Updated 4 years ago
- Find and notify users in your Active Directory with weak passwords☆101Updated 3 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- Files vetted, and approved for public release☆53Updated last year
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Updated 3 years ago
- This is a set of tools for doing forensics analysis on Microsoft ESE databases.☆124Updated 3 years ago
- A collection of static files maintained by the Sublime team, primarily used for phishing defense.☆87Updated this week
- A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem☆101Updated 6 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆130Updated 3 years ago
- Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.☆311Updated last month
- ☆162Updated last year
- Tools and scripts by Arctic Wolf☆67Updated last year
- A browser extension and API server for detecting corporate password use on external websites☆94Updated 5 months ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- ☆261Updated 6 years ago
- Collection of useful Canary tools☆78Updated last month
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Search a filesystem for indicators of compromise (IoC).☆71Updated 3 months ago
- POSIX script for mail security checks of domain names☆75Updated last year
- ☆118Updated last year
- ☆354Updated 3 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆79Updated 4 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 6 months ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- ☆65Updated 2 months ago
- RPZ Zone Files to Block DNS-over-HTTPS☆88Updated 3 years ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 4 years ago