DanMcInerney / SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆13Updated 5 years ago
Related projects: ⓘ
- E-mails, subdomains and names Harvester - OSINT☆13Updated 6 years ago
- Metasploit Framework☆10Updated 5 years ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆16Updated 6 years ago
- Advance Google Dorker and Vulnerability Scanner☆41Updated 5 years ago
- Python google hacking (dorking) script.☆16Updated 6 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated last year
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆16Updated 9 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆21Updated 3 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆43Updated last year
- Some scripts and stuff for wardriving and wifi hacks .... works great on kali and ubuntu 32 bit ...Reaver likes 32 bit binaries.☆23Updated 3 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆26Updated 4 years ago
- ☆20Updated this week
- Information gathering tool - OSINT☆33Updated 5 years ago
- Get files from Android directories☆11Updated 5 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆32Updated last year
- wifi attacks suite☆59Updated 3 years ago
- Passwords Recovery Tool☆15Updated 5 years ago
- A curated list of awesome warez and piracy links☆23Updated 3 years ago
- A tool to harvest credentials from leaked data dump☆60Updated 2 years ago
- ☆28Updated 7 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆26Updated 6 years ago
- ☆16Updated this week
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 5 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆16Updated 4 years ago
- [ Multi Encryption / Decryption ]☆20Updated 4 years ago
- Based on reading from The Hackers Playbook 3☆28Updated 4 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆16Updated 5 years ago
- Hacking Tools For All Debian-based OS☆39Updated 6 years ago
- ☆47Updated this week
- pwndb is a tool that looks for leaked passwords from a dark web breach database given a user or domain.☆34Updated 4 years ago