Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.
☆212Jun 25, 2024Updated last year
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A wordlist for brute forcing directories / files☆10Jul 7, 2015Updated 10 years ago
- A wordlist of API names for web application assessments☆871Jun 17, 2025Updated 9 months ago
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆18May 21, 2024Updated last year
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- multiple password 'asher using Python’s hashlib☆15Mar 24, 2021Updated 4 years ago
- ☆10May 25, 2023Updated 2 years ago
- ☆192Oct 12, 2022Updated 3 years ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆22May 1, 2024Updated last year
- Complex payload encoder☆241Jan 20, 2024Updated 2 years ago
- Some useful test data or payloads☆24Oct 30, 2021Updated 4 years ago
- Tools that can be useful for OSEP exam and PEN300 studies.☆73Mar 14, 2026Updated last week
- ☆39Jul 1, 2023Updated 2 years ago
- Custom scan profiles for use with Burp Suite Pro☆152Mar 21, 2024Updated 2 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- Burpsuite Extension for Jsmon☆23Feb 5, 2026Updated last month
- Use SE_BACKUP_NAME/SeBackupPrivilege to access objects you shouldn't have access to☆437Jul 29, 2013Updated 12 years ago
- A curated list of wordlists for bruteforcing and fuzzing☆1,221Feb 17, 2026Updated last month
- Infosec Wordlists and more.☆927Feb 10, 2026Updated last month
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- Hand-made Improved Nuclei Templates!🪴☆13Jun 12, 2023Updated 2 years ago
- Understanding some of the Anti-Reversing Techniques☆11Oct 6, 2019Updated 6 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆37Oct 23, 2025Updated 5 months ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- ☆23Apr 21, 2022Updated 3 years ago
- Burp Suite extension designed to help security professionals search for custom sensitive information in HTTP responses☆11Apr 25, 2023Updated 2 years ago
- Seamless AI Integration into Caido☆45Updated this week
- The Faction Burp Suite Extension☆13Mar 18, 2024Updated 2 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 6 years ago
- Username tools for penetration testing☆1,341Sep 20, 2024Updated last year
- PHP shells that work on Linux OS, macOS, and Windows OS.☆528Feb 27, 2026Updated 3 weeks ago
- Acunetix automate telegram bot☆11Jul 19, 2024Updated last year
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Monitor linux processes without root permissions☆5,927Mar 1, 2026Updated 3 weeks ago
- CVE-2022-39227 : Proof of Concept☆22Mar 19, 2024Updated 2 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Netcat for windows.☆21Sep 23, 2018Updated 7 years ago
- 多重判断网站文件扫描(网页相似性,关键词,状态码)☆23Jun 24, 2024Updated last year
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago