sorokinpf / russian_namesLinks
sorted russian names/surnames wordlists
☆74Updated 11 months ago
Alternatives and similar repositories for russian_names
Users that are interested in russian_names are comparing it to the libraries listed below
Sorting:
- Check bitrix vulnerabilities☆88Updated last year
- Bundle of common passwords targeting RUSSIAN-speaking audience (parsed from big data leaks)☆106Updated 6 years ago
- Useful collection of scapy-scripts and more☆32Updated last year
- RedTeam network tool based on OrangePi R1☆24Updated 11 months ago
- Yet Another Wordlists Repo☆124Updated 4 years ago
- About PIVOting☆13Updated 2 years ago
- Various wordlists for bruteforce☆35Updated 4 years ago
- 1C RAS Offensive Security Tool☆28Updated 2 years ago
- Some nuclei templates for pentest CMS Bitrix☆37Updated last month
- exfiltration/infiltration toolkit☆48Updated last year
- ☆47Updated 5 years ago
- Finding secrets in various (non-text) popular files.☆51Updated 2 months ago
- https://t.me/+V6d8SvKVFXo2MjIy☆41Updated 2 years ago
- ☆135Updated 4 years ago
- ☆93Updated 5 years ago
- Sonar is a security researcher's Swiss army knife for finding and exploiting vulnerabilities that require out-of-band interactions☆19Updated last week
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆39Updated last year
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Updated 3 years ago
- Bitrix vulnerability scanner☆21Updated 2 years ago
- ☆104Updated 2 years ago
- karma WiFi attack implementation☆55Updated last year
- Custom Russian WordList Generator☆45Updated 2 years ago
- Hackings style defence tricks☆56Updated last week
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆148Updated last year
- Updated version of n0kovo's Rule List☆42Updated 8 months ago
- Program for fuzzing parameters web application☆15Updated 8 months ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆25Updated 8 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆125Updated 4 months ago
- A monster cheatsheet on MITM attacks☆367Updated 7 months ago
- Cisco IOS Security Inspector☆40Updated last week