3ndG4me / KaliLists
Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.
☆214Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for KaliLists
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆156Updated 4 months ago
- Hydra Password Cracking Cheetsheet☆386Updated 4 years ago
- This is the walkthrough and cheatsheet of Machines on King of the hill on the online hacking platform TryHackme.☆92Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆791Updated last month
- Collection of reverse shells for red team operations.☆466Updated last month
- 🎯 RFI/LFI Payload List☆539Updated 4 months ago
- Infosec Wordlists and more.☆773Updated last year
- Shodan Dorks☆429Updated last year
- Personal compilation of wordlists & dictionaries for everything. Users, passwords, directories, files, vulnerabilities, fuzzing, injectio…☆261Updated 4 years ago
- Short checklists for penetration testing methodology☆187Updated last year
- checklist for testing the web applications☆225Updated last year
- Bug Bounty Tools used on Twitch - Recon☆271Updated 2 months ago
- smartrecon is a powerful shell script to automate the recon and finding common vulnerabilities for bug hunter☆144Updated 7 months ago
- OpenFuck exploit updated to linux 2018 - Apache mod_ssl < 2.8.7 OpenSSL - Remote Buffer Overflow☆180Updated 8 months ago
- Troubleshooting bash script for the TryHackMe OpenVPN connection pack☆90Updated last year
- Wordlists for Fuzzing☆85Updated 4 years ago
- TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.☆218Updated 2 weeks ago
- A typical search engine dork scanner scrapes search engines with dorks that you provide in order to find vulnerable URLs.☆240Updated last year
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆274Updated 2 years ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆427Updated 4 years ago
- Free, libre, effective, and data-driven wordlists for all!☆553Updated 3 years ago
- my kali desktop setup☆265Updated 5 months ago
- Automated Recon for Pentesting & Bug Bounty☆418Updated 9 months ago
- Cheatsheet to exploit and learn SQL Injection.☆134Updated 2 years ago
- Some notes about Hydra for bruteforcing☆172Updated 4 years ago
- ☆173Updated 3 months ago
- 🎯 CSV Injection Payloads☆195Updated 4 months ago
- ☆228Updated 3 years ago
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆61Updated 2 years ago