david-palma / wordlists
A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.
☆63Updated 2 years ago
Alternatives and similar repositories for wordlists:
Users that are interested in wordlists are comparing it to the libraries listed below
- Here are the most interesting Shodan dorks (according to me)☆77Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆70Updated last year
- clone from https://sourceforge.net/projects/crunch-wordlist/☆114Updated 8 years ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆268Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆244Updated 3 weeks ago
- Redirect All Traffic Through Tor Network For Kali Linux☆185Updated 3 weeks ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 7 months ago
- IoT Camera Reconnaissance and Live Viewer☆140Updated 8 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆168Updated 10 months ago
- capNcook - a dark web exploration tool☆67Updated last year
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆189Updated 5 months ago
- A tool for automatically change the Tor IP address over time.☆79Updated 2 weeks ago
- Automate installation of extra pentest tools on Kali Linux☆54Updated 4 years ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆134Updated 6 months ago
- TorNet is a Python package that automates IP address changes using Tor. It is a top tool for securing your networks by frequently changin…☆44Updated 10 months ago
- capNcook - a dark web exploration tool☆99Updated 6 months ago
- Autofill Phishing☆67Updated 4 months ago
- Profile layout☆13Updated last week
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated 9 months ago
- Distribución para OSINT basada en Debian 12 / OSINT Distribution based in Debian 12☆91Updated last year
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆419Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Shodan Dorks☆342Updated 2 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆121Updated 7 months ago
- Automated exploit scanner for cameras on the internet☆190Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts☆269Updated last year
- H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through th…☆244Updated 9 months ago
- 🕵️ Email osint tool☆62Updated last year
- ☆140Updated last year