c4b3rw0lf / wordlist-collectionLinks
A collection of wordlists to use with privilege escalation and password cracking tasks
☆14Updated last year
Alternatives and similar repositories for wordlist-collection
Users that are interested in wordlist-collection are comparing it to the libraries listed below
Sorting:
- ☆33Updated 7 months ago
- Wordlist generator☆16Updated 5 years ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- A tool for simplifying the process of researching IOCs.☆25Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- Dehashed API CLI☆21Updated 4 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Updated 5 years ago
- Scripts and One-Liners☆22Updated 7 months ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- Various scripts & tools☆12Updated last year
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆36Updated 5 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆22Updated 6 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- Shodan Port Scanner☆44Updated 4 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- stdin writes to slack☆14Updated 5 years ago
- ☆24Updated 6 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Command List for Hashcat and default keyspaces.☆16Updated 5 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago