SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆16Jan 8, 2019Updated 7 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- Random Tools☆19Jan 23, 2019Updated 7 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Jul 31, 2017Updated 8 years ago
- ☆16Updated this week
- Issues to consider when planning a red team exercise.☆14Aug 23, 2017Updated 8 years ago
- Hack whatsapp web☆10Jul 1, 2018Updated 7 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 3 weeks ago
- Recognizes your speech in mp3 audio file, wav file or laptop microphone and converts to text☆10Nov 18, 2019Updated 6 years ago
- A bunch of scripts used for network defense during competitions.☆15Apr 3, 2015Updated 10 years ago
- This is a tool that can help you analyze WiFi networks. It can keep track of the network traffic and provide you with detailed informatio…☆13Apr 2, 2023Updated 2 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- It is a program which converts wav file to srt file and translates text language.☆13Jun 20, 2024Updated last year
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- A Chef Cookbook to install and configure osquery.☆15Oct 19, 2022Updated 3 years ago
- Alias identity manager for Red Teams, OSINT collectors, journalists, and privacy-conscious people☆21Oct 27, 2023Updated 2 years ago
- PowerShell module to help getting tokens using managed identities☆17Dec 29, 2024Updated last year
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Firewalla Scripts for APC UPS Daemon☆13Dec 13, 2020Updated 5 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- A PowerShell Module for OneTimeSecret.com☆10Jun 19, 2021Updated 4 years ago
- Side Channel script☆25Mar 1, 2023Updated 3 years ago
- nmap nse script for web services screenshot☆16Jul 22, 2013Updated 12 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated 11 months ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- PowerShell scripts☆11Feb 19, 2018Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆12Jan 10, 2020Updated 6 years ago
- A python tool to find out anyone's Instagram ID using Instagram's suggested user chains. Recursively finds profiles by keywords(name), ma…☆23Jan 13, 2026Updated 2 months ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- PoC of BitcoinCore Denial-Of-Service and DoubleSpending☆10Nov 12, 2018Updated 7 years ago
- A Curated List of Microsoft Azure Networking Resources☆27Sep 24, 2024Updated last year
- Detect data containing Personally Identifiable Information (PII) in R☆15Jul 1, 2017Updated 8 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- An unofficial Humax IR4000HD terminal client with enhanced features.☆10Feb 2, 2019Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆463Oct 3, 2017Updated 8 years ago
- A DIY project to show failed ssh login attempts on a map in real-time☆11Apr 22, 2025Updated 11 months ago