sorokinpf / russian_namesLinks
sorted russian names/surnames wordlists
☆68Updated 8 months ago
Alternatives and similar repositories for russian_names
Users that are interested in russian_names are comparing it to the libraries listed below
Sorting:
- Check bitrix vulnerabilities☆85Updated last year
- Bundle of common passwords targeting RUSSIAN-speaking audience (parsed from big data leaks)☆102Updated 6 years ago
- Various wordlists for bruteforce☆35Updated 3 years ago
- Useful collection of scapy-scripts and more☆32Updated last year
- RedTeam network tool based on OrangePi R1☆23Updated 8 months ago
- Finding secrets in various (non-text) popular files.☆49Updated 3 months ago
- 1C RAS Offensive Security Tool☆27Updated 2 years ago
- Yet Another Wordlists Repo☆119Updated 3 years ago
- ☆44Updated 5 years ago
- Some nuclei templates for pentest CMS Bitrix☆35Updated 4 months ago
- About PIVOting☆12Updated last year
- exfiltration/infiltration toolkit☆48Updated 11 months ago
- https://t.me/+V6d8SvKVFXo2MjIy☆42Updated 2 years ago
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Updated 3 years ago
- ☆92Updated 5 years ago
- ☆100Updated last year
- A monster cheatsheet on MITM attacks☆365Updated 4 months ago
- My Wi-Fi scripts☆50Updated last year
- ☆134Updated 4 years ago
- karma WiFi attack implementation☆53Updated 11 months ago
- Hackings style defence tricks☆49Updated last week
- Custom Russian WordList Generator☆45Updated 2 years ago
- Leveraging GitHub Actions to rotate IP addresses during password spraying attacks to bypass IP-Based blocking☆146Updated last year
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆38Updated 11 months ago
- Sonar is a security researcher's Swiss army knife for finding and exploiting vulnerabilities that require out-of-band interactions☆16Updated last month
- NTP Exfiltration Tool☆146Updated last year
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆36Updated 11 years ago
- ☆18Updated 6 years ago
- Cisco IOS Security Inspector☆37Updated 2 months ago
- Pwning Sudo Rules☆28Updated 3 years ago