dustyfresh / dictionariesLinks
curated password lists and various other lists/dictionaries for security things
☆83Updated 3 months ago
Alternatives and similar repositories for dictionaries
Users that are interested in dictionaries are comparing it to the libraries listed below
Sorting:
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions☆221Updated 3 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 7 months ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆255Updated 3 weeks ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆75Updated 5 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆153Updated 10 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Updated last year
- An extremely fast and flexible web fuzzer☆218Updated 2 years ago
- A simple XSS finding tool☆109Updated 6 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆306Updated 6 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments☆246Updated 5 years ago
- ProxyDock is a Dockerfile and Bash script that converts your OpenVPN files into local proxies.☆137Updated 5 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 5 years ago
- Penetration Testing Playbook (PTP)☆175Updated 6 years ago
- ☆181Updated 11 years ago
- Linux post exploitation enumeration and exploit checking tools☆180Updated 5 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆281Updated 9 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆107Updated 5 years ago
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆219Updated 2 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆266Updated 5 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- udp-proto-scanner is a Perl script which discovers UDP services by sending triggers to a list of hosts☆99Updated last year
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- Note: Going through a full re-write of the tooling so the current versions in the repo do not work!☆406Updated 5 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆157Updated last year