david-palma / wordlistsLinks
A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.
☆83Updated 5 months ago
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- capNcook - a dark web exploration tool☆79Updated last year
- 1.6 billion passwords☆97Updated 4 years ago
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆345Updated last year
- tool used to change your IP every second your want☆413Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆275Updated last year
- Autofill Phishing☆82Updated 2 months ago
- Various wordlists FR & EN - Cracking French passwords☆301Updated this week
- Default Kali Linux Wordlists (SecLists Included)☆164Updated 5 months ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆120Updated 9 years ago
- WiFi Penetration Testing Guide☆631Updated last year
- Automate installation of extra pentest tools on Kali Linux☆56Updated 4 years ago
- Here are the most interesting Shodan dorks (according to me)☆96Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆206Updated 7 months ago
- capNcook - a dark web exploration tool☆117Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- ☆227Updated 9 months ago
- Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection☆284Updated 11 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆175Updated last year
- OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts☆287Updated 2 years ago
- A tool for automatically change the Tor IP address over time.☆112Updated 7 months ago
- "Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Sec…☆214Updated 2 years ago
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆266Updated last year
- Recolored Kali Linux wallpapers☆126Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆340Updated last year
- 🤖 The Modern Port Scanner 🤖☆19Updated 4 years ago
- ☆160Updated 2 years ago
- Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute f…☆232Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆54Updated 4 years ago
- Work in progress...☆519Updated last year