danielmiessler / SecListsLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆67,361Updated last week
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,752Updated 2 years ago
- Web path scanner☆13,728Updated last month
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆18,905Updated this week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,368Updated 2 months ago
- Fast web fuzzer written in Go☆15,210Updated 7 months ago
- A swiss army knife for pentesting networks☆8,989Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,963Updated 2 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,198Updated last week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,617Updated last year
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,276Updated 2 weeks ago
- Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren…☆9,145Updated 2 years ago
- Directory/File, DNS and VHost busting tool written in Go☆13,096Updated this week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆10,601Updated this week
- Attack Surface Management Platform☆9,258Updated 2 months ago
- CTF framework and exploit development library☆13,097Updated 2 weeks ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆72,110Updated 3 weeks ago
- hydra☆11,302Updated 2 weeks ago
- Fast passive subdomain enumeration tool.☆12,682Updated this week
- A little tool to play with Windows security☆21,092Updated 7 months ago
- Nikto web server scanner☆9,889Updated 2 weeks ago
- E-mails, subdomains and names Harvester - OSINT☆15,197Updated this week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,429Updated last month
- In-depth attack surface mapping and asset discovery☆13,864Updated last week
- Most advanced XSS scanner.☆14,551Updated 7 months ago
- Fast subdomains enumeration tool for penetration testers☆10,730Updated last year
- The Swiss Army knife for 802.11, BLE, HID, CAN-bus, IPv4 and IPv6 networks reconnaissance and MITM attacks.☆18,586Updated 3 weeks ago
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,093Updated 11 months ago
- Web application fuzzer☆6,357Updated last year
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆25,809Updated last week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,740Updated 2 years ago