SecWiki / SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆13Updated 9 years ago
Alternatives and similar repositories for SecLists:
Users that are interested in SecLists are comparing it to the libraries listed below
- This is a webshell open source project☆28Updated 9 years ago
- Curated list of public penetration testing reports released by several consulting firms☆12Updated 8 years ago
- Simple script to automate brutforcing blind sql injection vulnerabilities☆51Updated 7 years ago
- Struts2 S2-045-Nmap NSE script☆50Updated 8 years ago
- A cms discover recognize tool in python☆19Updated 9 years ago
- check cmd execute☆13Updated 8 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67Updated 6 years ago
- 投诉太狠啊,换个地方自己下吧☆15Updated 8 years ago
- Java Untrusted Deserialization Exploits Tools☆66Updated 9 years ago
- scripts used in my pentest work.☆44Updated 9 years ago
- CVE-2017-7269 to webshell or shellcode loader☆87Updated 7 years ago
- ☆4Updated 2 years ago
- 根据Golismero源码二次开发的分布式漏洞扫描器(调试版)☆19Updated 8 years ago
- crawl hackerone reports☆45Updated 6 years ago
- Flash XSS Scanner☆53Updated 8 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆107Updated 6 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆60Updated 7 years ago
- a poc framework to test hosts via zoomeye sdk☆32Updated 7 years ago
- st2-046-poc CVE-2017-5638☆21Updated 6 years ago
- This is a backdoor about discover network device ,and it can hidden reverse connecting the hacker's server with encrypt commuication 后门扫描…☆14Updated 9 years ago
- S2-055的环境,基于rest-show-case改造☆37Updated 7 years ago
- CVE-2016-8610 (SSL Death Alert) PoC☆34Updated 8 years ago
- 分布式的sqlmapapi☆11Updated 8 years ago
- ERPScan Public POC for CVE-2018-2636☆22Updated 7 years ago
- security course list☆14Updated 9 years ago
- ☆78Updated 10 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- New On Live Web Vul Scan☆41Updated 9 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆99Updated 7 years ago
- ☆34Updated 8 years ago