david-palma / wordlistsLinks
A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.
☆80Updated 4 months ago
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆334Updated last year
- Various wordlists FR & EN - Cracking French passwords☆290Updated this week
- Here are the most interesting Shodan dorks (according to me)☆93Updated last year
- Autofill Phishing☆76Updated last month
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆277Updated last year
- Shodan Dorks☆455Updated 7 months ago
- 1.6 billion passwords☆94Updated 4 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 6 months ago
- Default Kali Linux Wordlists (SecLists Included)☆157Updated 4 months ago
- Recolored Kali Linux wallpapers☆126Updated last year
- tool used to change your IP every second your want☆404Updated last year
- capNcook - a dark web exploration tool☆76Updated last year
- clone from https://sourceforge.net/projects/crunch-wordlist/☆120Updated 9 years ago
- Redirect All Traffic Through Tor Network For Kali Linux☆200Updated 6 months ago
- Work in progress...☆508Updated last year
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆175Updated last year
- WiFi Penetration Testing Guide☆602Updated last year
- OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts☆284Updated last year
- capNcook - a dark web exploration tool☆113Updated last year
- ☆209Updated 7 months ago
- WiFi Penetration Testing & Auditing Tool☆562Updated 5 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆326Updated last year
- ☆66Updated 2 years ago
- Bookmarklet to find endpoints easily with one click☆68Updated last year
- Magnet Link for Downloading☆285Updated last year
- Search & Parse Password Leaks☆392Updated last year
- An auto-updating list of shodan dorks with info on the amount of results they return!☆279Updated this week
- ☆314Updated last year
- Trace Labs OSINT VM☆415Updated 2 weeks ago