carlospolop / Auto_WordlistsLinks
☆1,257Updated this week
Alternatives and similar repositories for Auto_Wordlists
Users that are interested in Auto_Wordlists are comparing it to the libraries listed below
Sorting:
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,020Updated last year
- Automatic SSTI detection tool with interactive interface☆1,170Updated 2 weeks ago
- 🎯 XML External Entity (XXE) Injection Payload List☆1,199Updated last year
- ☆880Updated 2 years ago
- Netcat for windows 32/64 bit☆711Updated last year
- 🎯 Server Side Template Injection Payloads☆687Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆581Updated 3 years ago
- Active Directory and Internal Pentest Cheatsheets☆1,707Updated 2 weeks ago
- Automatic SSRF fuzzer and exploitation tool☆3,306Updated 6 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,716Updated last year
- 🎯 Command Injection Payload List☆3,475Updated last year
- Rockyou for web fuzzing☆2,875Updated last week
- A tool to perform Kerberos pre-auth bruteforcing☆3,034Updated last year
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,700Updated 3 years ago
- ☆925Updated 5 months ago
- Penelope Shell Handler☆1,037Updated this week
- Automated & Manual Wordlists provided by Assetnote☆1,511Updated last week
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,181Updated 2 years ago
- A simple script just made for self use for bypassing 403☆1,959Updated last year
- ☆2,526Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆1,988Updated 2 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,546Updated 2 months ago
- ☆1,134Updated 4 years ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,654Updated 6 months ago
- Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.☆1,642Updated this week
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,015Updated last year
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,276Updated 2 years ago
- Simple and accurate guide for linux privilege escalation tactics☆238Updated last year
- Compiled Binaries for Ghostpack☆1,462Updated 10 months ago
- Sticky notes for pentesting, bug bounty, CTF.☆720Updated last month