david-palma / wordlists
A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.
☆65Updated 2 years ago
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆72Updated last year
- capNcook - a dark web exploration tool☆69Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 8 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆88Updated last year
- Cross-platform username reconnaissance tool built for OSINT investigators, cyber threat analysts, red teamers, and CTF enthusiasts.☆74Updated 3 weeks ago
- H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through th…☆246Updated 9 months ago
- Automate installation of extra pentest tools on Kali Linux☆54Updated 4 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆187Updated last month
- Here are the most interesting Shodan dorks (according to me)☆78Updated last year
- capNcook - a dark web exploration tool☆100Updated 7 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆46Updated 4 years ago
- Autofill Phishing☆70Updated 5 months ago
- Shodan Dorks☆379Updated 3 months ago
- A web scraping tool that extracts email addresses from multiple URLs listed in a file, or a simple url. It crawls through all page routes…☆45Updated 7 months ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆102Updated 2 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆270Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 8 months ago
- A dos (denial of service) attack for local networks using dead router attack (IPv6) and ARP attack (IPv4) simultaneously☆113Updated 2 weeks ago
- Evora is the best AI personal assistant bot in the field of ethical hacking and penetration testing. She has a high level of accuracy and…☆79Updated 7 months ago
- Turning smart lights into Wifi Hacking implants.☆119Updated 3 months ago
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆242Updated last year
- notes and ramblings from my OSCP/PenTesting Studies☆86Updated last year
- IoT Camera Reconnaissance and Live Viewer☆145Updated 9 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆135Updated 2 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆245Updated last month
- A Powerful Intruder written in Python☆14Updated 3 years ago
- WiFi Cha0s t00lkit xox☆27Updated this week
- 🤖 The Modern Port Scanner 🤖☆18Updated 3 years ago
- Bookmarklet to find endpoints easily with one click☆59Updated 11 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆170Updated 11 months ago