DanMcInerney / SecListsLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆14Updated 6 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- E-mails, subdomains and names Harvester - OSINT☆13Updated 7 years ago
- Metasploit Framework☆11Updated 6 years ago
- Information gathering tool - OSINT☆38Updated 6 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 7 years ago
- A tool to harvest credentials from leaked data dump☆76Updated 3 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆46Updated 2 years ago
- A very flexible phone number wordlist generator☆69Updated last year
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆16Updated 6 years ago
- Information Gathering Tool☆58Updated 2 years ago
- Passwords Recovery Tool☆19Updated 6 years ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆44Updated 6 years ago
- WIP - Chromium plugin for PhoneInfoga's Google Search scanner☆82Updated 4 years ago
- OSINT webcam mapping project☆86Updated 7 years ago
- wifi attacks suite☆60Updated 5 years ago
- Get files from Android directories☆11Updated 6 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆25Updated 6 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆84Updated 5 years ago
- Python util to retrieve full display name and profile picture from a single email address☆103Updated 4 years ago
- Ransombile is a tool that can be used in different scenarios to compromise someone’s digital life when having physical access to a locked…☆83Updated 3 years ago
- Hacking Tools For All Debian-based OS☆50Updated 7 years ago
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆15Updated 10 years ago
- Python google hacking (dorking) script.☆17Updated 7 years ago
- A curated list of awesome warez and piracy links☆26Updated 4 years ago
- Portable Hacking Machine with Raspberry Pi☆88Updated 6 years ago
- Mac and hostname random changer☆44Updated 8 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆30Updated 7 years ago
- Bypass CloudFlare to find real IP address☆20Updated 6 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago