c4b3rw0lf / wordlist-collectionLinks
A collection of wordlists to use with privilege escalation and password cracking tasks
☆14Updated last year
Alternatives and similar repositories for wordlist-collection
Users that are interested in wordlist-collection are comparing it to the libraries listed below
Sorting:
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- ☆33Updated 4 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- ☆20Updated 6 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Script Recon Bug Bounty☆10Updated 4 years ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 3 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 11 months ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains☆18Updated 4 months ago
- Extract endpoints from specific Git repository for fuzzing☆23Updated 4 years ago
- ☆29Updated 2 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- New Framework Red Team Operations☆18Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Application for logging HTTP and DNS Requests☆14Updated 4 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Noob Penetration tester☆11Updated last year
- Fast dns resolver☆13Updated last year
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆13Updated 3 weeks ago
- stdin writes to slack☆14Updated 5 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Updated 3 years ago
- Wordlist generator☆16Updated 4 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- ☆12Updated 3 years ago