Custom Russian WordList Generator
☆46Feb 10, 2023Updated 3 years ago
Alternatives and similar repositories for crwg
Users that are interested in crwg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bundle of common passwords targeting RUSSIAN-speaking audience (parsed from big data leaks)☆109Jan 23, 2019Updated 7 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- go-glmatrix is a golang version of glMatrix, which is "designed to perform vector and matrix operations stupidly fast".☆11Feb 5, 2021Updated 5 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 3 years ago
- Blogging system in Modern Perl☆11Jan 3, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Parse greppable Nmap output as a tree☆14Nov 13, 2022Updated 3 years ago
- Jar2Exe extraction tool☆15Dec 28, 2022Updated 3 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- E4's C2 server☆21Oct 12, 2020Updated 5 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Distillations and expansions on Rocktastic12a☆17Feb 5, 2026Updated 2 months ago
- Repo for Missoula class☆26May 25, 2024Updated last year
- Spartan is a powerful and versatile network scanning tool designed to help system administrators and security professionals identify vuln…☆17Feb 11, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- ☆18Oct 17, 2017Updated 8 years ago
- 🦈 Prometheus exporter for pcap metrics☆16Feb 15, 2023Updated 3 years ago
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆68Jun 16, 2018Updated 7 years ago
- FETCH THE PASSWORD STRETCHER☆38Dec 8, 2022Updated 3 years ago
- A powerful reverse shell generator☆46Mar 18, 2026Updated 3 weeks ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆18May 2, 2024Updated last year
- Standardizing Security Titles☆23Apr 9, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Feb 20, 2022Updated 4 years ago
- bip38-cracker, for this contest by casascius: https://bitcointalk.org/index.php?topic=128699.0☆21Dec 5, 2012Updated 13 years ago
- dbling: The Chrome OS Forensic Toolset☆13Oct 27, 2020Updated 5 years ago
- ☆11Feb 19, 2023Updated 3 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆12Jun 19, 2025Updated 9 months ago
- A collection of scripts I use with hashcat☆21Nov 28, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- ☆17Aug 25, 2022Updated 3 years ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- Scrape pastes from pastebin and archive them for review☆17Mar 6, 2019Updated 7 years ago
- In-depth internals, my personal notes, example codes and projects. Includes - Thousands of codes, OOP, Concurrency, Parallelism, Gorouti…☆12Nov 25, 2020Updated 5 years ago