PaulSec / SecListsLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆11Updated 7 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 7 years ago
- ☆33Updated 11 months ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆35Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Simple Karma Attack☆68Updated 5 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆14Updated 6 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- A small collection of OSINT data collection tools.☆17Updated 6 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Updated 6 years ago
- Tools and scripts dedicated to Android application security☆52Updated 4 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- Trying to be the best tool to search for exploits in the terminal.☆12Updated 8 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated this week
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Install popular tools used while pentesting & playing labs☆13Updated 4 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated 2 years ago
- ☆10Updated 3 years ago
- ☆53Updated 4 years ago