0x90n / SecListsLinks
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆14Updated 9 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- ☆12Updated 5 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Updated 4 years ago
- A curated list of amazingly awesome OSINT☆35Updated 8 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆37Updated 4 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Updated 4 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 5 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated this week
- Various components we use in labs☆10Updated 5 years ago
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆25Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 5 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 6 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
- Notes and Commands for CTFs☆23Updated 5 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated last week
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 10 months ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆73Updated last year
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆85Updated 4 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 2 months ago
- ☆19Updated 9 months ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 3 years ago
- A library that scrapes Linkedin for user data☆24Updated 4 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆68Updated 4 years ago