david-palma / wordlistsLinks
A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.
☆88Updated 6 months ago
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- Autofill Phishing☆84Updated 3 months ago
- 1.6 billion passwords☆98Updated 4 years ago
- Automate installation of extra pentest tools on Kali Linux☆60Updated 4 years ago
- capNcook - a dark web exploration tool☆84Updated last year
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆277Updated last year
- Here are the most interesting Shodan dorks (according to me)☆95Updated 2 years ago
- Bookmarklet to find endpoints easily with one click☆70Updated last year
- Various wordlists FR & EN - Cracking French passwords☆302Updated this week
- RockYou2024 10 billion passwords leaked in the largest compilation of all time☆345Updated last year
- capNcook - a dark web exploration tool☆118Updated last year
- 🤖 The Modern Port Scanner 🤖☆20Updated 4 years ago
- ☆237Updated 9 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆207Updated 8 months ago
- A tool for automatically change the Tor IP address over time.☆116Updated 8 months ago
- Shodan Dorks☆469Updated 10 months ago
- tool used to change your IP every second your want☆421Updated last year
- OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts☆286Updated 2 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆99Updated 2 years ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆120Updated 9 years ago
- Default Kali Linux Wordlists (SecLists Included)☆167Updated 6 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆81Updated last year
- WiFi Penetration Testing Guide☆638Updated last year
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆56Updated 4 years ago
- A Powerful Intruder written in Python☆20Updated 4 years ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 8 months ago
- H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through th…☆272Updated last year
- A web based OSINT ressource and tool☆185Updated 8 months ago
- ☆66Updated 2 years ago
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆226Updated 2 years ago
- Cross-platform username reconnaissance tool built for OSINT investigators, cyber threat analysts, red teamers, and CTF enthusiasts.☆114Updated 4 months ago