DanMcInerney / SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆14Updated 5 years ago
Alternatives and similar repositories for SecLists:
Users that are interested in SecLists are comparing it to the libraries listed below
- Metasploit Framework☆11Updated 5 years ago
- E-mails, subdomains and names Harvester - OSINT☆14Updated 7 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 7 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Python google hacking (dorking) script.☆17Updated 6 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Updated 4 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- Information gathering tool - OSINT☆33Updated 6 years ago
- Get files from Android directories☆11Updated 6 years ago
- Some scripts and stuff for wardriving and wifi hacks .... works great on kali and ubuntu 32 bit ...Reaver likes 32 bit binaries.☆26Updated 3 years ago
- website admin panel finder☆35Updated 4 years ago
- A curated list of awesome warez and piracy links☆27Updated 4 years ago
- An automated Python script which installs an extra arsenal of penetration testing tools and utilities into Kali Linux.☆30Updated 7 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 5 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year
- Advance Google Dorker and Vulnerability Scanner☆48Updated 6 years ago
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- CUPP - Common User Passwords Profiler !☆12Updated 9 months ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆16Updated 5 years ago
- Based on reading from The Hackers Playbook 3☆29Updated 5 years ago
- A Windows Tool for doing OSINT investigations on a Facebook Profile☆65Updated 6 years ago
- A tool to harvest credentials from leaked data dump☆66Updated 3 years ago
- Hacking Tools For All Debian-based OS☆48Updated 6 years ago
- Record X11 keypress events to a log file☆24Updated 7 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 4 years ago
- I'm uploading dorks here.☆49Updated 9 years ago
- wifi attacks suite☆59Updated 4 years ago
- Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.☆33Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆64Updated 6 years ago