berzerk0 / Probable-Wordlists
Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
☆8,909Updated last year
Alternatives and similar repositories for Probable-Wordlists:
Users that are interested in Probable-Wordlists are comparing it to the libraries listed below
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,660Updated 4 years ago
- Exploitation Framework for Embedded Devices☆12,509Updated 2 weeks ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,514Updated last year
- Attack Surface Management Platform☆8,708Updated 2 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,052Updated 8 months ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,714Updated 2 months ago
- A swiss army knife for pentesting networks☆8,705Updated last year
- Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.☆4,067Updated 9 months ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,634Updated 2 weeks ago
- NSE script based on Vulners.com API☆3,300Updated last year
- A Tool for Domain Flyovers☆5,755Updated 2 years ago
- Web application fuzzer☆6,162Updated 8 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,793Updated last month
- Fast subdomains enumeration tool for penetration testers☆10,332Updated 9 months ago
- Automated Mass Exploiter☆5,114Updated last year
- Next generation web scanner☆5,857Updated 9 months ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,780Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆62,607Updated this week
- Nikto web server scanner☆9,231Updated this week
- Common User Passwords Profiler (CUPP)☆4,766Updated last year
- Advanced vulnerability scanning with Nmap NSE☆3,606Updated 7 months ago
- Collection of some common wordlists such as RDP password, user name list, ssh password wordlist for brute force. IP Cameras Default Passw…☆1,613Updated 2 years ago
- hydra☆10,377Updated last month
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,175Updated last year
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,294Updated 7 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆5,019Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆14,247Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,493Updated last week
- Open Source Vulnerability Management Platform☆5,389Updated 2 weeks ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,248Updated last week