g0tmi1k / SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆97Updated this week
Alternatives and similar repositories for SecLists:
Users that are interested in SecLists are comparing it to the libraries listed below
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- How to prepare for OSCP complete guide☆129Updated 5 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆144Updated 3 years ago
- Custom Tools and Notes from my own Penetration Testing Experience☆274Updated last year
- Pentesting Cheatsheets and Guides☆123Updated 7 years ago
- Some of the best web shells that you might need☆45Updated 5 years ago
- Script for Kali that adds a bunch of tools and customizes it to be much better☆176Updated 4 years ago
- Homemade scripts to-do various vulnerable challenges☆76Updated 4 years ago
- Penetration Testing Notes and Playbook (PTP)☆175Updated 6 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 7 years ago
- ByePass automates a large number of password cracking tasks using optimized dictionaries and mangling rules☆72Updated 2 months ago
- ☆153Updated 7 years ago
- Just a collection of pentest stuffs☆95Updated 5 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆51Updated 9 years ago
- davtest (improved)- Exploits WebDAV folders☆107Updated last year
- A Linux enumeration script for Hack The Box☆187Updated 5 years ago
- udp-proto-scanner is a Perl script which discovers UDP services by sending triggers to a list of hosts☆99Updated 8 months ago
- RSMangler will take a wordlist and perform various manipulations on it similar to those done by John the Ripper with a few extras.☆220Updated 5 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆274Updated 9 years ago
- Simple script to generate commands to achieve reverse shells.☆116Updated 4 years ago
- Pentesting/Bugbounty Dockerfiles.☆176Updated 3 years ago
- useful pentest note☆66Updated 5 months ago
- Offensive Security / Pentesting Cheat Sheets☆97Updated 6 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆113Updated 2 years ago
- VPN pentest tools and scripts☆121Updated 7 years ago
- A python based blind SQL injection exploitation script☆137Updated 5 years ago
- Pentest: Subdomains enumeration tool for penetration testers.☆157Updated 9 months ago
- Collection of things made during my OSCP journey☆257Updated 7 years ago
- OSCP cheet sheet☆196Updated 4 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆160Updated 7 years ago