☆73Sep 6, 2017Updated 8 years ago
Alternatives and similar repositories for WordLists
Users that are interested in WordLists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repo collects nuclei template from 600+ github repos, updates every 6 hours.☆36Feb 17, 2026Updated 2 months ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- TCP reverse shell written in C# with the option to choose between Windows command prompt or MS powershell.☆26May 9, 2019Updated 6 years ago
- Alias for storing ffuf results☆20May 23, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆36Jul 15, 2020Updated 5 years ago
- Burp Suite extension for parsing Swagger web service definition files☆19Jul 15, 2025Updated 9 months ago
- Vulnerable webapp testbed☆24May 11, 2016Updated 9 years ago
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆58Sep 21, 2023Updated 2 years ago
- Rust client for the EventSource browser API☆23Mar 13, 2021Updated 5 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- HTTP(S) directory/file brute forcer☆21Feb 22, 2023Updated 3 years ago
- Baseline a Windows System against LOLBAS☆74Feb 2, 2026Updated 2 months ago
- ☆18Jan 9, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- A subdomain fuzzing tool☆172Jun 1, 2024Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Jun 20, 2022Updated 3 years ago
- ParamX is a tool designed to extract and categorize interesting subdomains and parameters from URLs.☆32Oct 7, 2025Updated 6 months ago
- ☆26Sep 29, 2018Updated 7 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 6 months ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 4 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- Replacement for the old Unix crypt☆16Sep 17, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- This is the first ever prenup on Ethereum blockchain (to the best of my knowledge). You can take this code to write your own prenup too!☆12Jun 22, 2016Updated 9 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- Blind XSS Scanner is a tool that can be used to scan for blind XSS vulnerabilities in web applications.☆403May 28, 2025Updated 10 months ago
- rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments☆249Oct 15, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Automatically generated Sysmon parser for Azure Sentinel☆18Jan 6, 2026Updated 3 months ago
- Reverse Shell for Android☆24Apr 12, 2014Updated 12 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- Bug Bounty statistics tool.☆33Nov 17, 2022Updated 3 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago