CSbyGB / wordlistsLinks
Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.
☆11Updated 4 years ago
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- CSbyGB - Gabrielle B's new Blog!☆23Updated 3 months ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆124Updated 3 years ago
- ☆39Updated 2 years ago
- This is a repository for network security tools and technologies.☆99Updated 3 years ago
- CSbyGB PenTips Gitbook☆114Updated last month
- ☆73Updated 10 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆24Updated 2 years ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆34Updated 2 years ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆135Updated 2 years ago
- ☆24Updated 4 years ago
- ☆21Updated 3 years ago
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆50Updated 7 months ago
- Minimalist notes for CEH-practical Cert.☆39Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 3 years ago
- ☆139Updated 3 years ago
- 🧾 Collection of resources to study for CompTia Pentest+ exam (PT0-002).☆29Updated 4 years ago
- Config files for my GitHub profile.☆13Updated 3 years ago
- ☆106Updated 4 years ago
- ☆52Updated 2 years ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆91Updated 6 months ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- Useful resources about phishing email analysis☆87Updated 9 months ago
- ☆45Updated 4 years ago
- ☆188Updated last year
- ☆63Updated 2 years ago
- CEH Practical Preparation☆11Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆50Updated 4 years ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆233Updated last year
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆21Updated 2 years ago