00xZEROx00 / kali-wordlistsLinks
Default Kali Linux Wordlists (SecLists Included)
☆170Updated 7 months ago
Alternatives and similar repositories for kali-wordlists
Users that are interested in kali-wordlists are comparing it to the libraries listed below
Sorting:
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆241Updated 3 years ago
- Recolored Kali Linux wallpapers☆129Updated last year
- Automate installation of extra pentest tools on Kali Linux☆60Updated 4 years ago
- capNcook - a dark web exploration tool☆85Updated last year
- clone from https://sourceforge.net/projects/crunch-wordlist/☆120Updated 9 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆56Updated 4 years ago
- list of usernames and email addresses for pentests☆173Updated 3 years ago
- A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.☆87Updated 7 months ago
- Autofill Phishing☆85Updated 4 months ago
- WiFi Penetration Testing Guide☆650Updated 2 years ago
- Work in progress...☆524Updated last year
- EthicalHacking, Python, Nmap, Metasploit☆244Updated 5 years ago
- Nmap cheatsheet for penetration testing☆56Updated 6 years ago
- Here are the most interesting Shodan dorks (according to me)☆98Updated 2 years ago
- PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.☆137Updated 3 months ago
- Hydra Password Cracking Cheetsheet☆413Updated 5 years ago
- 🤖 The Modern Port Scanner 🤖☆20Updated 4 years ago
- A step-by-step walkthrough of different machines "pwned" on the CTF-like platform, HackTheBox.☆67Updated 3 years ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆403Updated last year
- Shodan Dorks☆531Updated 2 years ago
- tryhame rooms walkthrough☆46Updated last week
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆204Updated last year
- The following include a list of pentest tools available across the web. Many are free and even open source, others are premium tools and …☆46Updated 5 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆209Updated 9 months ago
- Simple Python SSH Brute Forcing (Credential Stuffing)☆221Updated 3 years ago
- Bookmarklet to find endpoints easily with one click☆74Updated last year
- There are many cheat sheets out there, but this is mine.☆36Updated 10 months ago
- A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)☆50Updated last year
- Installs parrotOS repository and commonly used tools from parrotOS in ubuntu/debian☆57Updated 3 years ago