danielmiessler / SecListsLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆66,022Updated this week
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- Directory/File, DNS and VHost busting tool written in Go☆12,651Updated last week
- Fast web fuzzer written in Go☆14,844Updated 5 months ago
- Impacket is a collection of Python classes for working with network protocols.☆14,918Updated this week
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,697Updated last year
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,461Updated this week
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,149Updated last week
- In-depth attack surface mapping and asset discovery☆13,625Updated last month
- Fast subdomains enumeration tool for penetration testers☆10,610Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,616Updated 2 years ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,153Updated 3 weeks ago
- CTF framework and exploit development library☆12,925Updated last week
- Web path scanner☆13,497Updated 2 weeks ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,503Updated last year
- Most advanced XSS scanner.☆14,359Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆70,396Updated this week
- Six Degrees of Domain Admin☆10,346Updated 2 months ago
- A swiss army knife for pentesting networks☆8,932Updated last year
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,198Updated last week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆6,067Updated last month
- A collection of awesome penetration testing resources, tools and other shiny things☆24,061Updated 3 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,376Updated last year
- A little tool to play with Windows security☆20,844Updated 4 months ago
- Fast passive subdomain enumeration tool.☆12,346Updated last week
- Web application fuzzer☆6,297Updated last year
- Empire is a PowerShell and Python post-exploitation agent.☆7,708Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,629Updated 5 years ago
- Next generation web scanner☆6,108Updated this week
- A fast, simple, recursive content discovery tool written in Rust.☆7,001Updated this week
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,073Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,827Updated last week