0x90n / SecListsLinks
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆14Updated 9 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- ☆12Updated 4 years ago
- A curated list of amazingly awesome OSINT☆35Updated 8 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆49Updated last month
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆100Updated last year
- ☆46Updated 2 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Updated 3 years ago
- Various components we use in labs☆10Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 3 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Updated 4 years ago
- Notes and Commands for CTFs☆23Updated 5 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- Create Password lists for cracking lyrical passwords☆15Updated last year
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆25Updated 5 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 weeks ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- ☆21Updated 2 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆29Updated 4 years ago
- ☆14Updated 5 years ago
- ☆12Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago