Yet Another Wordlists Repo
☆130Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for YAWR
Users that are interested in YAWR are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various wordlists for bruteforce☆36Nov 9, 2021Updated 4 years ago
- A list of checks with tips for analyzing the security of Android applications☆14Nov 19, 2019Updated 6 years ago
- Sonar is a security researcher's Swiss army knife for finding and exploiting vulnerabilities that require out-of-band interactions☆21Mar 11, 2026Updated last month
- Framework for blind boolean-based sql injections exploatation. Use it if sqlmap does shit.☆29Mar 26, 2022Updated 4 years ago
- GraphQL application security testing helper☆20May 22, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Generate wordlists for fuzzing API method names☆55Oct 16, 2020Updated 5 years ago
- ☆13May 12, 2020Updated 5 years ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- sorted russian names/surnames wordlists☆78Feb 7, 2025Updated last year
- Golden collection of weak passwords☆71Dec 12, 2024Updated last year
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆68Jun 16, 2018Updated 7 years ago
- Bundle of common passwords targeting RUSSIAN-speaking audience (parsed from big data leaks)☆109Jan 23, 2019Updated 7 years ago
- All MITM attacks in one place.☆1,025Dec 17, 2021Updated 4 years ago
- brute-forcing su for fun and possibly profit☆100May 22, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- It's my solution for bugbounty automation☆23Feb 24, 2026Updated last month
- An old Windows workstations LPE for domain environments without LDAP signing/channel binding.☆35Feb 4, 2023Updated 3 years ago
- A Python-based tool for analyzing Active Directory security posture by processing LDAP dumps, NTDS.dit extracts, and password cracking re…☆27May 6, 2025Updated 11 months ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆124Aug 20, 2023Updated 2 years ago
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆140Sep 21, 2020Updated 5 years ago
- Another way to bypass WAF Cheat Sheet (draft)☆435Nov 28, 2018Updated 7 years ago
- Решения веб части новичковой лиги команды po_beda☆13Jul 21, 2023Updated 2 years ago
- ☆44Aug 5, 2022Updated 3 years ago
- ☆17Jun 8, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Check bitrix vulnerabilities☆92Jan 22, 2024Updated 2 years ago
- AD ACL abuse☆395Sep 11, 2025Updated 7 months ago
- 🔎 Hunt down social media accounts by username across social networks☆16Aug 3, 2023Updated 2 years ago
- OPA policies for securing Docker API☆11Aug 14, 2023Updated 2 years ago
- List of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов☆14Aug 3, 2023Updated 2 years ago
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆29Feb 6, 2026Updated 2 months ago
- ☆279Jun 27, 2022Updated 3 years ago
- 浏览器XSS 过滤器Fuzzing 框架 (browser xss aduit fuzzing framework )..☆15Sep 13, 2016Updated 9 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆37Apr 6, 2026Updated last week
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 4 months ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆26May 8, 2023Updated 2 years ago
- Magisk Plugin for Updating iptables When Proxy Changes☆10Mar 17, 2025Updated last year
- Collection of many ldap bofs for domain enumeration and privilege escalation. Created for use with the Adaptix C2.☆72Dec 15, 2025Updated 3 months ago
- NTFS parsing library in C#. Allows one to parse and read NTFS structures on disk.☆32Jul 16, 2021Updated 4 years ago
- Highlighting different firefox containers in Burp Proxy☆12Dec 4, 2020Updated 5 years ago