gmelodie / awesome-wordlistsLinks
A curated list of wordlists for bruteforcing and fuzzing
☆1,173Updated 5 months ago
Alternatives and similar repositories for awesome-wordlists
Users that are interested in awesome-wordlists are comparing it to the libraries listed below
Sorting:
- Infosec Wordlists and more.☆912Updated 6 months ago
- Real-world infosec wordlists, updated regularly☆1,609Updated this week
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆241Updated 3 years ago
- Work in progress...☆779Updated 6 months ago
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,309Updated 2 weeks ago
- Rockyou for web fuzzing☆2,992Updated 4 months ago
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆1,021Updated last year
- ☆1,819Updated 2 months ago
- 📜 Yet another collection of wordlists☆2,078Updated last week
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,199Updated last year
- A Modern Framework for Bug Bounty Hunting☆640Updated 10 months ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆1,819Updated last month
- Shodan Dorks☆531Updated 2 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,050Updated last year
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,163Updated 2 years ago
- A repository that includes all the important wordlists used while bug hunting.☆1,366Updated 2 years ago
- Useful Google Dorks for WebSecurity and Bug Bounty☆1,151Updated this week
- Free, libre, effective, and data-driven wordlists for all!☆641Updated 4 years ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆2,463Updated last week
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information abo…☆1,694Updated 6 months ago
- ☆1,166Updated 2 months ago
- list of usernames and email addresses for pentests☆175Updated 3 years ago
- Ressources for bug bounty hunting☆1,882Updated 3 years ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆745Updated 2 years ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆916Updated last month
- Awesome Vulnerable Applications☆1,325Updated last month
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆403Updated last year
- CeWL is a Custom Word List Generator☆2,528Updated 2 months ago
- A OWASP Based Checklist With 500+ Test Cases☆840Updated 3 years ago
- Hydra Password Cracking Cheetsheet☆413Updated 5 years ago