drtychai / wordlistsLinks
Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.
☆194Updated last year
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- OpenSSH 2.3 < 7.7 - Username Enumeration☆42Updated last year
- A wordlist repository with human-curated and reviewed content.☆113Updated last year
- This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆248Updated 11 months ago
- 🎯 CSV Injection Payloads☆220Updated 11 months ago
- PHP 8.1.0-dev Backdoor System Shell Script☆92Updated 4 years ago
- CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆65Updated 3 years ago
- ☆108Updated 2 years ago
- Web Application Security Testing Tools☆245Updated last year
- Some notes about Hydra for bruteforcing☆183Updated 5 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆291Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- Local File Inclusion discovery and exploitation tool☆318Updated 6 months ago
- A script that you can run in the background!☆177Updated 5 years ago
- Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.☆157Updated last year
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆228Updated 3 years ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆143Updated last year
- Simple Python Script For Performing XMLRPC Dictionary Attack☆134Updated 4 years ago
- clone from https://sourceforge.net/projects/crunch-wordlist/☆119Updated 8 years ago
- improving...☆193Updated 2 weeks ago
- 🎯 Directory Payload List☆172Updated 11 months ago
- Transition form local file inclusion attacks to remote code exection☆64Updated 4 years ago
- ☆211Updated 4 years ago
- A pentesting tool that dumps the source code from .git even when the directory traversal is disabled☆229Updated 3 years ago
- Perfect wordlist for discovering directories and files on target site☆302Updated last year
- Short checklists for penetration testing methodology☆191Updated last year
- SSTI Payload Generator☆91Updated 2 years ago
- ☆55Updated 6 years ago
- Damn Vulnerable WordPress☆185Updated last year
- Wordlists for Fuzzing☆104Updated 4 years ago
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆144Updated 9 months ago