0x90n / SecListsLinks
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆14Updated 9 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- ☆12Updated 5 years ago
- A curated list of amazingly awesome OSINT☆38Updated 9 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆49Updated last week
- Various components we use in labs☆10Updated 5 years ago
- Create Password lists for cracking lyrical passwords☆17Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆35Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Updated 2 months ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆87Updated 5 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 4 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- ☆33Updated last year
- Notes and Commands for CTFs☆22Updated 5 years ago
- ☆21Updated 2 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆66Updated 5 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- ☆49Updated 2 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆52Updated 3 years ago
- A web front-end for password cracking and analytics☆16Updated 7 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated this week
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Updated 4 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Updated 4 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆78Updated 2 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Hashes of infamous malware☆26Updated 2 years ago