danielmiessler / SecListsLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆64,704Updated this week
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- Directory/File, DNS and VHost busting tool written in Go☆12,313Updated 2 weeks ago
- Fast web fuzzer written in Go☆14,424Updated 3 months ago
- In-depth attack surface mapping and asset discovery☆13,401Updated last week
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,636Updated last year
- Fast subdomains enumeration tool for penetration testers☆10,529Updated last year
- Fast passive subdomain enumeration tool.☆12,094Updated 2 weeks ago
- E-mails, subdomains and names Harvester - OSINT☆13,189Updated this week
- Web application fuzzer☆6,245Updated 11 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,102Updated last week
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,019Updated last year
- Most advanced XSS scanner.☆14,203Updated 3 months ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,950Updated 9 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆69,020Updated last week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13,580Updated 6 months ago
- A swiss army knife for pentesting networks☆8,852Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆14,683Updated this week
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆17,960Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆24,258Updated this week
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,361Updated this week
- A little tool to play with Windows security☆20,635Updated 3 months ago
- Adversary Emulation Framework☆9,791Updated 3 weeks ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,191Updated this week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆15,006Updated 7 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,523Updated last year
- Attack Surface Management Platform☆8,938Updated 2 months ago
- Next generation web scanner☆5,996Updated last week
- A Tool for Domain Flyovers☆5,823Updated 3 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,809Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,513Updated 4 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,390Updated last year