albinowax / SecListsLinks
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆18Updated 9 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- Common Findings Database☆102Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- ☆51Updated 9 years ago
- ☆75Updated 11 years ago
- Automated enumeration☆30Updated 4 years ago
- PoC for an adaptive parallelised DNS prober☆108Updated 3 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆155Updated 10 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Image size issues plugin for Burp Suite☆95Updated 7 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool [Unofficial]☆96Updated 11 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- ☆26Updated 9 years ago
- Advanced XPath Injection Tool☆35Updated 10 years ago
- ☆52Updated 5 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆102Updated 8 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated last year
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 7 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 7 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- ☆43Updated 9 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago