00xZEROx00 / kali-wordlistsLinks
Default Kali Linux Wordlists (SecLists Included)
☆165Updated 5 months ago
Alternatives and similar repositories for kali-wordlists
Users that are interested in kali-wordlists are comparing it to the libraries listed below
Sorting:
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆240Updated 3 years ago
- Recolored Kali Linux wallpapers☆127Updated last year
- Automate installation of extra pentest tools on Kali Linux☆58Updated 4 years ago
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆85Updated 6 months ago
- WiFi Penetration Testing Guide☆631Updated last year
- capNcook - a dark web exploration tool☆82Updated last year
- Autofill Phishing☆82Updated 3 months ago
- Hydra Password Cracking Cheetsheet☆411Updated 5 years ago
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆345Updated last year
- Work in progress...☆519Updated last year
- list of usernames and email addresses for pentests☆163Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆56Updated 4 years ago
- ☆41Updated 4 years ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆120Updated 9 years ago
- EthicalHacking, Python, Nmap, Metasploit☆222Updated 5 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆206Updated 8 months ago
- tool used to change your IP every second your want☆417Updated last year
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆386Updated last year
- 🤖 The Modern Port Scanner 🤖☆19Updated 4 years ago
- SQL Injection Vulnerability Scanner made with Python☆379Updated 8 months ago
- Here are the most interesting Shodan dorks (according to me)☆95Updated last year
- ☆24Updated 2 months ago
- Installs parrotOS repository and commonly used tools from parrotOS in ubuntu/debian☆56Updated 3 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆201Updated last year
- Bookmarklet to find endpoints easily with one click☆71Updated last year
- The following include a list of pentest tools available across the web. Many are free and even open source, others are premium tools and …☆44Updated 3 months ago
- A curated list of wordlists for bruteforcing and fuzzing☆1,132Updated 3 months ago
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆215Updated 2 years ago
- Repository for security-related Python scripts.☆208Updated 2 years ago
- Magnet Link for Downloading☆290Updated last year