david-palma / wordlistsLinks
A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.
β78Updated 3 months ago
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads πͺβ273Updated last year
- capNcook - a dark web exploration toolβ73Updated last year
- 1.6 billion passwordsβ93Updated 4 years ago
- Autofill Phishingβ74Updated this week
- Bookmarklet to find endpoints easily with one clickβ62Updated last year
- Automate installation of extra pentest tools on Kali Linuxβ55Updated 4 years ago
- tool used to change your IP every second your wantβ390Updated last year
- Here are the most interesting Shodan dorks (according to me)β84Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ51Updated 4 years ago
- WiFi Penetration Testing Guideβ579Updated last year
- Redirect All Traffic Through Tor Network For Kali Linuxβ196Updated 5 months ago
- clone from https://sourceforge.net/projects/crunch-wordlist/β120Updated 8 years ago
- capNcook - a dark web exploration toolβ107Updated 10 months ago
- Various wordlists FR & EN - Cracking French passwordsβ290Updated this week
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authenticationβ219Updated 2 years ago
- Recolored Kali Linux wallpapersβ124Updated last year
- Turning smart lights into Wifi Hacking implants.β128Updated 6 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating systeβ¦β174Updated last year
- β202Updated 6 months ago
- Open-Source Phishing Toolkitβ223Updated last month
- RockYou2024 10 billion passwords leaked in the largest compilation of all timeβ327Updated last year
- Shodan Dorksβ435Updated 6 months ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghβ¦β62Updated 4 years ago
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.β550Updated last month
- Repo containing cracked red teaming tools.β191Updated 2 weeks ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-hβ¦β79Updated last year
- Trace Labs OSINT VMβ397Updated last week
- π€ The Modern Port Scanner π€β19Updated 4 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs β¦β256Updated 4 months ago
- Find Real IPs hidden behind Cloudflare with Criminal IP(criminalip.io), security OSINT Tool.β114Updated last year