david-palma / wordlistsView external linksLinks
A curated list of wordlists for discovery, enumeration, fuzzing, and exploitation.
☆92May 28, 2025Updated 8 months ago
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Aug 20, 2024Updated last year
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆29Jan 11, 2023Updated 3 years ago
- Recopilación de Reglas y Diccionarios para Password Cracking☆28May 2, 2019Updated 6 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 2 months ago
- ☆11Sep 15, 2024Updated last year
- How to bypass your Bell Aliant provided modems.☆12Feb 2, 2026Updated last week
- A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.☆40Sep 1, 2025Updated 5 months ago
- ☆10Oct 9, 2024Updated last year
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- A discord bot which can steal discord tokens. For educational purposes only.☆10May 5, 2023Updated 2 years ago
- Inspired by the Tryhackme.com Room "Python for Pentesters"☆10Jun 9, 2024Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- SSH brute-forcing tool written in python☆15Feb 10, 2023Updated 3 years ago
- This repo contains different variants of Bug Bounty & Security & Pentest & Tech related Articles☆54Jan 7, 2025Updated last year
- 🛠️ In this repository you will find all the OSCP tools I created and used during the course. 🛠️☆12Dec 23, 2023Updated 2 years ago
- Command line tools for mxroute.com mail hosting☆11Jan 9, 2025Updated last year
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 11 years ago
- Tool for comparing Jar files or Zip files☆11Jul 6, 2016Updated 9 years ago
- Python library for the https://mega.nz/ API.☆13Feb 13, 2024Updated 2 years ago
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆11Aug 23, 2021Updated 4 years ago
- ☆10Oct 12, 2021Updated 4 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- ☆16Jun 21, 2024Updated last year
- Phone number tracer in bash, enjoy!☆10Dec 2, 2021Updated 4 years ago
- Virtual host bruteforcer against given network range or single ip☆11Mar 21, 2019Updated 6 years ago
- Share secrets encrypted☆14Feb 3, 2026Updated last week
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Get latest Exploit Databases notification on your Desktop☆16Jan 29, 2020Updated 6 years ago
- Scrape and convert Prezi presentations to PDF☆13Mar 24, 2022Updated 3 years ago
- ☆13Feb 27, 2025Updated 11 months ago
- All combinations of various characters, to get the desired word☆18Dec 13, 2023Updated 2 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- Extend wordlist by appending digits and special characters to each word.☆10Apr 26, 2023Updated 2 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago