A curated list of wordlists for bruteforcing and fuzzing
☆1,215Feb 17, 2026Updated 2 weeks ago
Alternatives and similar repositories for awesome-wordlists
Users that are interested in awesome-wordlists are comparing it to the libraries listed below
Sorting:
- Infosec Wordlists and more.☆926Feb 10, 2026Updated 3 weeks ago
- A repository that includes all the important wordlists used while bug hunting.☆1,379Mar 11, 2023Updated 2 years ago
- Real-world infosec wordlists, updated regularly☆1,642Mar 2, 2026Updated last week
- 📜 Yet another collection of wordlists☆2,155Updated this week
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆769Apr 4, 2023Updated 2 years ago
- Rockyou for web fuzzing☆3,033Feb 11, 2026Updated 3 weeks ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,039Aug 23, 2025Updated 6 months ago
- An IIS short filename enumeration tool☆1,127Nov 25, 2024Updated last year
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆3,012Jun 24, 2024Updated last year
- Javascript security analysis (JSA) is a program for javascript analysis during web application security assessment.☆560Mar 8, 2025Updated last year
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,552Updated this week
- Hidden parameters discovery suite☆2,028Sep 8, 2024Updated last year
- ☆861Dec 26, 2025Updated 2 months ago
- My Priv8 Nuclei Templates☆339May 12, 2024Updated last year
- Contextual Content Discovery Tool☆3,106Apr 29, 2024Updated last year
- ☆299Jul 16, 2022Updated 3 years ago
- A curated list of various bug bounty tools☆5,817Feb 9, 2026Updated last month
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,401Sep 13, 2024Updated last year
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆534Dec 4, 2024Updated last year
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,077Jul 29, 2024Updated last year
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,089Aug 14, 2024Updated last year
- oneliner commands for bug bounties☆461Jul 25, 2022Updated 3 years ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,270Feb 10, 2024Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,280Updated this week
- Some files for bruteforcing certain things.☆1,400Feb 18, 2026Updated 2 weeks ago
- Potentially dangerous files☆3,275Aug 25, 2025Updated 6 months ago
- Automated & Manual Wordlists provided by Assetnote☆1,637Feb 27, 2026Updated last week
- A fuzzer for detecting open redirect vulnerabilities☆781Jul 1, 2024Updated last year
- Top disclosed reports from HackerOne☆5,358Feb 28, 2026Updated last week
- Free, libre, effective, and data-driven wordlists for all!☆646Sep 10, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,212Updated this week
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,859Feb 28, 2026Updated last week
- Subdomain takeover vulnerability checker☆1,525Sep 10, 2024Updated last year
- All about bug bounty (bypasses, payloads, and etc)☆6,658Sep 8, 2023Updated 2 years ago
- declutters url lists for crawling/pentesting☆1,532Feb 23, 2025Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,234Jan 31, 2026Updated last month
- Pass in a list of URLs with query strings, get back a unique list of URLs and query string combinations☆394Jun 17, 2020Updated 5 years ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,932Oct 4, 2025Updated 5 months ago
- Collection of methodology and test case for various web vulnerabilities.☆7,039Jun 25, 2025Updated 8 months ago