Yet Another Wordlists Repo
☆129Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for YAWR
Users that are interested in YAWR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various wordlists for bruteforce☆36Nov 9, 2021Updated 4 years ago
- A list of checks with tips for analyzing the security of Android applications☆14Nov 19, 2019Updated 6 years ago
- Sonar is a security researcher's Swiss army knife for finding and exploiting vulnerabilities that require out-of-band interactions☆21Mar 11, 2026Updated last week
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Mar 26, 2022Updated 3 years ago
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- ☆186Jun 17, 2025Updated 9 months ago
- Generate wordlists for fuzzing API method names☆55Oct 16, 2020Updated 5 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- sorted russian names/surnames wordlists☆77Feb 7, 2025Updated last year
- Generate users list using certain format☆23Jan 23, 2019Updated 7 years ago
- Golden collection of weak passwords☆71Dec 12, 2024Updated last year
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆68Jun 16, 2018Updated 7 years ago
- All MITM attacks in one place.☆1,022Dec 17, 2021Updated 4 years ago
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆35Feb 4, 2023Updated 3 years ago
- Репозиторий содержит список вопросов по наступальной безопасности.☆365Oct 26, 2025Updated 4 months ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆27May 6, 2025Updated 10 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆124Aug 20, 2023Updated 2 years ago
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆139Sep 21, 2020Updated 5 years ago
- Another way to bypass WAF Cheat Sheet (draft)☆433Nov 28, 2018Updated 7 years ago
- Решения веб части новичковой лиги команды po_beda☆13Jul 21, 2023Updated 2 years ago
- ☆44Aug 5, 2022Updated 3 years ago
- ☆17Jun 8, 2024Updated last year
- Information gathering & OSINT reconnaissance tool for phone numbers☆15Dec 10, 2018Updated 7 years ago
- List of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов☆14Aug 3, 2023Updated 2 years ago
- Analyse and explore .hprof heap dumps.☆16Mar 19, 2021Updated 5 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]☆34Aug 26, 2021Updated 4 years ago
- ☆279Jun 27, 2022Updated 3 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Sep 13, 2016Updated 9 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- ☆37Updated this week
- Office 365 and Exchange Enumeration☆200May 7, 2019Updated 6 years ago
- ☆18Mar 16, 2021Updated 5 years ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 3 months ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆27May 8, 2023Updated 2 years ago
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆67Dec 15, 2025Updated 3 months ago
- ☆35Mar 22, 2019Updated 7 years ago
- NTFS parsing library in C#. Allows one to parse and read NTFS structures on disk.☆32Jul 16, 2021Updated 4 years ago
- Hacker101☆46Aug 14, 2018Updated 7 years ago