SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆16Jan 8, 2019Updated 7 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Jul 31, 2017Updated 8 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆179Sep 11, 2023Updated 2 years ago
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- Tool for password spraying RDP☆98Oct 12, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Hack whatsapp web☆10Jul 1, 2018Updated 7 years ago
- A LLM prompt to give some semblance of referential recursive structure☆24Mar 5, 2026Updated last month
- Tool allows to convert text into Morse code and save to wav file.☆15Oct 17, 2013Updated 12 years ago
- Firmware images for hacking, reverse engineering, and teardown of the Ryze / DJI / Intel Movidius Tello☆10Dec 6, 2018Updated 7 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated last month
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 11 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- This is a tool that can help you analyze WiFi networks. It can keep track of the network traffic and provide you with detailed informatio…☆13Apr 2, 2023Updated 3 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- It is a program which converts wav file to srt file and translates text language.☆13Jun 20, 2024Updated last year
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Produce authentic fake data☆21Jun 16, 2024Updated last year
- PowerShell module to help getting tokens using managed identities☆17Dec 29, 2024Updated last year
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Mail extractor with your dork☆22Jan 27, 2021Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A composite score for one's GitHub quality.☆22May 1, 2022Updated 3 years ago
- A PowerShell Module for OneTimeSecret.com☆10Jun 19, 2021Updated 4 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- PowerShell scripts☆11Feb 19, 2018Updated 8 years ago
- Sample code on using Firewalla MSP API☆22Jun 27, 2025Updated 9 months ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆12Jan 10, 2020Updated 6 years ago
- PoC of BitcoinCore Denial-Of-Service and DoubleSpending☆10Nov 12, 2018Updated 7 years ago
- Detect data containing Personally Identifiable Information (PII) in R☆15Jul 1, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Configuration as code to enable support for the Australian Government's Email Protective Marking Standard (EPMS) within Microsoft 365.☆14May 31, 2022Updated 3 years ago
- An unofficial Humax IR4000HD terminal client with enhanced features.☆10Feb 2, 2019Updated 7 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆464Oct 3, 2017Updated 8 years ago
- Docker templates for unRAID☆11Mar 31, 2026Updated last week
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago