DanMcInerney / SecListsLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆14Updated 6 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- Metasploit Framework☆11Updated 6 years ago
- E-mails, subdomains and names Harvester - OSINT☆13Updated 7 years ago
- Information gathering tool - OSINT☆39Updated 6 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 7 years ago
- A very flexible phone number wordlist generator☆70Updated last year
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆83Updated 3 years ago
- Python util to retrieve full display name and profile picture from a single email address☆103Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- An automated Wireless RogueAP MITM attack framework.☆186Updated 6 years ago
- wifi attacks suite☆60Updated 5 years ago
- Python script that will extract all saved passwords from your google chrome database on windows only☆79Updated 5 years ago
- Passwords Recovery Tool☆20Updated 6 years ago
- A tool to harvest credentials from leaked data dump☆77Updated 3 years ago
- bluesnarfing proof-of-concept tool.☆56Updated 9 years ago
- ☆37Updated 8 years ago
- OSINT webcam mapping project☆87Updated 7 years ago
- Most advanced framework yet! From spoofing to cryptography, Trity has it all!☆43Updated 8 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆16Updated 6 years ago
- Simple script for the WHID injector - a rubberducky wifi☆115Updated last year
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 3 years ago
- Phishing Campaign Toolkit☆13Updated 4 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Updated 8 years ago
- Does some google dorks against a domain☆165Updated 5 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆86Updated 6 years ago
- Get your USB Rubber Ducky up and running faster☆45Updated 8 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- Get files from Android directories☆11Updated 6 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated 2 years ago
- Priv8 Image Capturing through Network Based On Driftnet☆24Updated 7 years ago
- wifisky Python script for pentesting wireless networks☆99Updated 6 years ago