david-palma / wordlists
A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.
☆61Updated 2 years ago
Alternatives and similar repositories for wordlists:
Users that are interested in wordlists are comparing it to the libraries listed below
- Autofill Phishing☆64Updated 3 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆166Updated 9 months ago
- capNcook - a dark web exploration tool☆64Updated 11 months ago
- Fork from @rsmudge/armitage☆127Updated 2 years ago
- A tool for automatically change the Tor IP address over time. Maximize anonymity!☆72Updated last week
- TorNet is a Python package that automates IP address changes using Tor. It is a top tool for securing your networks by frequently changin…☆42Updated 9 months ago
- A dos (denial of service) attack for local networks using dead router attack (IPv6) and ARP attack (IPv4) simultaneously☆88Updated last year
- Installs parrotOS repository and commonly used tools from parrotOS in ubuntu/debian☆52Updated 3 years ago
- Here are the most interesting Shodan dorks (according to me)☆75Updated last year
- 1.6 billion passwords☆68Updated 3 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 6 months ago
- Turning smart lights into Wifi Hacking implants.☆118Updated last month
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆242Updated 6 months ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆210Updated last year
- A social engineering tool designed to seamlessly locate profiles using usernames while offering convenient reverse image search functiona…☆86Updated 9 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆287Updated 9 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆69Updated last year
- IoT Camera Reconnaissance and Live Viewer☆138Updated 8 months ago
- To perform OSINT on an instagram profile☆72Updated 7 months ago
- Emagnet is a tool for find leaked databases with 97.1% accurate to grab mail + password together from pastebin leaks. Support for brute f…☆223Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆181Updated last week
- WiFi Penetration Testing Guide☆516Updated last year
- Obtain a Phone Number full profile including HLR, Reputation, Carrier, Social Media Accounts, Geolocation, Validation, Availabilty, Porta…☆238Updated last year
- PIP-INTEL is an OSINT (Open Source Intelligence) tool designed using various open-source tools and pip packages.☆144Updated 10 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆132Updated 5 months ago
- Profile layout☆13Updated 7 months ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆119Updated 4 months ago
- The Ultimate URL Masking Tool - An open-source URL masking tool designed to help you Hide Phishing URLs and make them look legit using s…☆286Updated last month
- Automate installation of extra pentest tools on Kali Linux☆52Updated 3 years ago
- tool used to change your IP every second your want☆211Updated 8 months ago