dustyfresh / dictionaries
curated password lists and various other lists/dictionaries for security things
☆83Updated 3 weeks ago
Alternatives and similar repositories for dictionaries:
Users that are interested in dictionaries are comparing it to the libraries listed below
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 9 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆75Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- AWS S3 Bucket/Object Finder☆119Updated 3 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- Pemburu AKA GoldDigger.☆70Updated 5 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- An extremely fast and flexible web fuzzer☆217Updated 2 years ago
- VPN pentest tools and scripts☆122Updated 7 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- Penetration testing scripts☆141Updated 6 years ago
- Password wordlist generator using song lyrics for targeted bruteforce audits / attacks. Useful for penetration testing or security resear…☆93Updated last year
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆254Updated 9 months ago
- Local File Inclusion Exploitation Tool (mirror)☆123Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- davtest (improved)- Exploits WebDAV folders☆110Updated 2 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 5 months ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆275Updated 9 years ago
- Tools of "The Bug Hunters Methodology V2 by @jhaddix"☆198Updated 7 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆132Updated last year
- ☆120Updated 8 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆72Updated 6 years ago
- ☆274Updated 3 years ago
- Linux Local Enumeration Script☆79Updated 4 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago