3ndG4me / KaliLists
Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.
☆223Updated 3 years ago
Alternatives and similar repositories for KaliLists:
Users that are interested in KaliLists are comparing it to the libraries listed below
- This is the walkthrough and cheatsheet of Machines on King of the hill on the online hacking platform TryHackme.☆95Updated 3 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆178Updated 9 months ago
- Hydra Password Cracking Cheetsheet☆397Updated 4 years ago
- 🎯 RFI/LFI Payload List☆570Updated 8 months ago
- Bug Bounty Tools used on Twitch - Recon☆294Updated 6 months ago
- A curated list wordlists for bruteforcing and fuzzing☆887Updated 6 months ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆288Updated 3 years ago
- Simple Python Script For Performing XMLRPC Dictionary Attack☆134Updated 4 years ago
- checklist for testing the web applications☆243Updated 2 years ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆456Updated 4 years ago
- Collection of reverse shells for red team operations.☆487Updated 2 weeks ago
- A hacking tool for bug bounties. Sharing and modifying is encouraged!☆238Updated 2 years ago
- Infosec Wordlists and more.☆818Updated last year
- Damn Vulnerable WordPress☆178Updated last year
- list of usernames and email addresses for pentests☆97Updated 2 years ago
- Shodan Dorks☆457Updated 2 years ago
- Perfect wordlist for discovering directories and files on target site☆296Updated last year
- Personal compilation of wordlists & dictionaries for everything. Users, passwords, directories, files, vulnerabilities, fuzzing, injectio…☆272Updated 4 years ago
- ☆23Updated 4 years ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆114Updated 8 years ago
- smartrecon is a powerful shell script to automate the recon and finding common vulnerabilities for bug hunter☆153Updated 11 months ago
- Cheatsheet to exploit and learn SQL Injection.☆138Updated 2 years ago
- Work in progress...☆698Updated last month
- ☆232Updated 3 years ago
- 🎯 CSV Injection Payloads☆208Updated 8 months ago
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆243Updated 7 months ago
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆940Updated 8 months ago
- Instructions on how to create your very own Pwnbox, originally created by HTB☆401Updated 2 years ago
- ☆178Updated 7 months ago
- ☆207Updated 4 years ago