Bundle of common passwords targeting RUSSIAN-speaking audience (parsed from big data leaks)
☆109Jan 23, 2019Updated 7 years ago
Alternatives and similar repositories for russkiwlst
Users that are interested in russkiwlst are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆68Jun 16, 2018Updated 7 years ago
- sorted russian names/surnames wordlists☆78Feb 7, 2025Updated last year
- Custom Russian WordList Generator☆46Feb 10, 2023Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- Use Axiom relations with an RDBMS☆15Jan 24, 2014Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A common database library for managing and querying security data☆18Jan 12, 2026Updated 3 months ago
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆62Updated this week
- RSEScan is a command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a gi…☆17Jun 7, 2024Updated last year
- ☆16Nov 21, 2021Updated 4 years ago
- Yet Another Wordlists Repo☆131Jan 6, 2022Updated 4 years ago
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- Generate wordlists for fuzzing API method names☆55Oct 16, 2020Updated 5 years ago
- It's my solution for bugbounty automation☆24Apr 13, 2026Updated 2 weeks ago
- Vulnerability scanner for Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Mar 26, 2022Updated 4 years ago
- Leakix Searcher☆14Apr 30, 2021Updated 5 years ago
- 🔎 Hunt down social media accounts by username across social networks☆16Aug 3, 2023Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Jul 10, 2018Updated 7 years ago
- List of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов☆14Aug 3, 2023Updated 2 years ago
- Experiments in weaponizing Crystal for offensive operations.☆29Mar 23, 2023Updated 3 years ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆32Apr 4, 2026Updated 3 weeks ago
- ☆13May 12, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVE-2023-20198 PoC (!)☆11Oct 17, 2023Updated 2 years ago
- Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)☆44Jun 6, 2022Updated 3 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Files that relate to the Wordfence report on DHS Grizzly Steppe data☆21Jan 8, 2017Updated 9 years ago
- Man in the Browser Framework☆50Dec 24, 2024Updated last year
- ☆11Mar 7, 2021Updated 5 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆24Mar 12, 2026Updated last month
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆18Sep 1, 2024Updated last year
- An archive of descrypt hashes for common non-personal passwords☆46Jun 28, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 4 months ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Golang CLI binary used for installing and managing Ghostwriter☆19Apr 9, 2026Updated 3 weeks ago
- The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.☆13Mar 17, 2024Updated 2 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- ☆15Apr 6, 2025Updated last year
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year