sharsi1 / russkiwlstView external linksLinks
Bundle of common passwords targeting RUSSIAN-speaking audience (parsed from big data leaks)
☆107Jan 23, 2019Updated 7 years ago
Alternatives and similar repositories for russkiwlst
Users that are interested in russkiwlst are comparing it to the libraries listed below
Sorting:
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆68Jun 16, 2018Updated 7 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- sorted russian names/surnames wordlists☆76Feb 7, 2025Updated last year
- Custom Russian WordList Generator☆45Feb 10, 2023Updated 3 years ago
- A Ruby micro-framework for writing and running exploit payloads☆23Jan 16, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated last month
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- Leakix Searcher☆14Apr 30, 2021Updated 4 years ago
- Tools to recover, extract and decrypt Atomic wallets☆12Dec 12, 2025Updated 2 months ago
- Some nuclei templates for pentest CMS Bitrix☆38Nov 13, 2025Updated 3 months ago
- ☆10Jan 8, 2018Updated 8 years ago
- Haschcat Rules processor☆14Mar 22, 2023Updated 2 years ago
- services-names-wordlist☆84Oct 31, 2025Updated 3 months ago
- Conference talk slides and code☆11Aug 6, 2020Updated 5 years ago
- Use Axiom relations with an RDBMS☆15Jan 24, 2014Updated 12 years ago
- Rule Processor Y is a next-gen Rule processor with complex multibyte character support built to support Hashcat☆36Nov 25, 2025Updated 2 months ago
- Network traffic monitor/analyzer, with CLI/TUI. Written in Rust.☆17Oct 12, 2025Updated 4 months ago
- Vulnerability scanner for Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 3 years ago
- An archive of descrypt hashes for common non-personal passwords☆41Jun 28, 2025Updated 7 months ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Scrape pastes from pastebin and archive them for review☆17Mar 6, 2019Updated 6 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Finding secrets in various (non-text) popular files.☆52Oct 21, 2025Updated 3 months ago
- Updated version of n0kovo's Rule List☆45Jan 29, 2026Updated 2 weeks ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆22Jun 30, 2025Updated 7 months ago
- Script to apply official workaround for VMware vCenter log4j vulnerability CVE-2021-44228☆17Dec 15, 2021Updated 4 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- JXA script based on research by Jeff Johnson on leveraging TextEdit to remove quarantine attributes on files. Jeff's original research is…☆17Jan 31, 2021Updated 5 years ago
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- Yet Another Wordlists Repo☆127Jan 6, 2022Updated 4 years ago
- This is very basic automated recon script tool.☆18Jul 14, 2024Updated last year
- Swift code to programmatically execute local or hosted JXA payloads from Terminal without using the on-disk osascript binary.☆23Apr 22, 2021Updated 4 years ago
- JavaScript source map parser and extractor written in Python☆24Aug 6, 2019Updated 6 years ago
- A script to enumerate valid usernames based on the requests response times.☆22May 3, 2022Updated 3 years ago
- Check bitrix vulnerabilities☆91Jan 22, 2024Updated 2 years ago
- MD5 collision testing☆17Nov 24, 2024Updated last year
- Run Sigma detection rules on logs from the new MacOS EndpointSecurity Framework☆22Jan 22, 2021Updated 5 years ago