0x90n / SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆14Updated 9 years ago
Alternatives and similar repositories for SecLists:
Users that are interested in SecLists are comparing it to the libraries listed below
- ☆12Updated 4 years ago
- Notes and Commands for CTFs☆22Updated 4 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- FIles and guides related to using Elasticstack as a SIEM☆12Updated 4 years ago
- Various components we use in labs☆10Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- ☆33Updated 3 months ago
- A curated list of amazingly awesome OSINT☆35Updated 8 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 5 months ago
- ☆21Updated 2 years ago
- random scripts and utilities used for pentesting or R&D purposes☆9Updated last year
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- DNS Dashboard for hunting and identifying beaconing☆15Updated 4 years ago
- An analytical framework for network traffic and behavioral analytics☆22Updated 2 years ago
- A conglomeration of resources for any color of the rainbow☆14Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- ☆14Updated 5 years ago
- Hashes of infamous malware☆26Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- Admin for☆15Updated 6 years ago
- ☆45Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆21Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago