DanMcInerney / SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆13Updated 5 years ago
Alternatives and similar repositories for SecLists:
Users that are interested in SecLists are comparing it to the libraries listed below
- Metasploit Framework☆10Updated 5 years ago
- E-mails, subdomains and names Harvester - OSINT☆15Updated 6 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 6 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 6 years ago
- Some scripts and stuff for wardriving and wifi hacks .... works great on kali and ubuntu 32 bit ...Reaver likes 32 bit binaries.☆25Updated 3 years ago
- Information gathering tool - OSINT☆33Updated 6 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- An automated Python script which installs an extra arsenal of penetration testing tools and utilities into Kali Linux.☆30Updated 7 years ago
- A curated list of awesome warez and piracy links☆26Updated 4 years ago
- Advance Google Dorker and Vulnerability Scanner☆49Updated 6 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆15Updated 5 years ago
- A tool to harvest credentials from leaked data dump☆65Updated 3 years ago
- Network Infrastructure Penetration Testing Tool☆15Updated 7 years ago
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆16Updated 9 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Get files from Android directories☆11Updated 6 years ago
- Passwords Recovery Tool☆15Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆51Updated 7 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Updated 4 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 5 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆29Updated 6 years ago
- Hacking Tools For All Debian-based OS☆47Updated 6 years ago
- Collection of white, grey and blackHat tools - for use playing around. setting up and operating pentesting linux builds - Primarily Kali-…☆18Updated 6 years ago
- Most advanced framework yet! From spoofing to cryptography, Trity has it all!☆42Updated 7 years ago
- Tools and scripts dedicated to Android application security☆49Updated 3 years ago
- Download airgeddon's required files from github, optionally specify branch and save location☆33Updated 2 years ago
- A collection of scripts to run on a fresh install of kali linux☆32Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- wifi attacks suite☆59Updated 4 years ago