david-palma / wordlistsLinks
A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.
☆79Updated 3 months ago
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- 1.6 billion passwords☆94Updated 4 years ago
- Autofill Phishing☆76Updated 3 weeks ago
- Various wordlists FR & EN - Cracking French passwords☆291Updated this week
- capNcook - a dark web exploration tool☆74Updated last year
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆329Updated last year
- capNcook - a dark web exploration tool☆111Updated 11 months ago
- Here are the most interesting Shodan dorks (according to me)☆89Updated last year
- Redirect All Traffic Through Tor Network For Kali Linux☆197Updated 5 months ago
- ☆205Updated 6 months ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆120Updated 8 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆280Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 5 months ago
- Recolored Kali Linux wallpapers☆125Updated last year
- WiFi Penetration Testing Guide☆590Updated last year
- A Powerful Intruder written in Python☆17Updated 3 years ago
- tool used to change your IP every second your want☆400Updated last year
- A tool for automatically change the Tor IP address over time.☆96Updated 5 months ago
- Bookmarklet to find endpoints easily with one click☆62Updated last year
- TorNet is a Python package that automates IP address changes using Tor. It is a top tool for securing your networks by frequently changin…☆51Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆176Updated last year
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆97Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆51Updated 4 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆313Updated last year
- Shodan Dorks☆446Updated 7 months ago
- Automate installation of extra pentest tools on Kali Linux☆56Updated 4 years ago
- Moxie scans & tests MQTT services. Secure your IoT infrastructure!☆47Updated last year
- Omnisci3nt – See What They’ve Tried to Hide Extract deep intelligence from any domain. From subdomains to SSL certs, archived secrets to …☆300Updated last month
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Updated last year
- Open-Source Phishing Toolkit☆230Updated 2 months ago
- A list of different misc resources from the discord. PDF's, websites, tools, and everything else you could fathom. Here to aid in your go…☆60Updated last year