PaulSec / SecListsLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆11Updated 7 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 7 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- ☆33Updated last year
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- Miscellaneous tools for BloodHound☆18Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆35Updated 3 years ago
- Simple script to download some missing tools in Kali☆33Updated 5 years ago
- ☆53Updated 4 years ago
- Find open databases - Powered by Binaryedge.io☆14Updated 6 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 5 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Updated 4 years ago
- Tools and scripts dedicated to Android application security☆52Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Updated 8 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 6 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated 2 years ago
- A small collection of OSINT data collection tools.☆17Updated 6 years ago
- Simple Karma Attack☆68Updated 5 years ago
- A Python3 powered bash script written to slightly automate the tool installation process of the Hacker Playbook Book (http://thehackerpla…☆40Updated 6 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆13Updated 6 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 3 weeks ago
- Searches online paste sites for certain search terms which can indicate a possible data breach.☆75Updated 4 years ago
- WebHook for Red Team☆25Updated 4 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Updated 3 months ago
- ☆10Updated 3 years ago