h0tak88r / WordlistsView external linksLinks
A Collection of Wordlists for Penetration Testing
☆33Dec 13, 2025Updated 2 months ago
Alternatives and similar repositories for Wordlists
Users that are interested in Wordlists are comparing it to the libraries listed below
Sorting:
- Python/Bash automation customization script designed to automate the reconnaissance process☆21Jan 28, 2024Updated 2 years ago
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago
- Collection of templates from various resources☆42Dec 5, 2025Updated 2 months ago
- bash script for automating subdomain enumeration process either passive or active☆29Dec 17, 2024Updated last year
- my nuclei templates #new☆11Jun 24, 2024Updated last year
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- Cyber Security Notes, Methodology, Resources and Tips☆218Dec 23, 2025Updated last month
- Quick tool to create custom wordlists like how fuzzers work☆10Sep 29, 2023Updated 2 years ago
- Python Script to Print the name of the companies that are acquired by a Target Company and the Time of Acquisition.☆26Dec 5, 2021Updated 4 years ago
- Shared wordlists used for common subdomains , directory bruteforcing etc.☆10May 26, 2025Updated 8 months ago
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 8 years ago
- Advanced Reconnaissance and Web Application Discovery☆89Dec 22, 2021Updated 4 years ago
- My bug bounty notes☆35Apr 10, 2021Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20May 27, 2020Updated 5 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- Simple Automation script for juniper cve-2023-36845☆19Jan 30, 2024Updated 2 years ago
- ☆42Jul 14, 2021Updated 4 years ago
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- Fast and customizable Blind SQL vulnerability scanner based on simple xor payloads.☆23Sep 21, 2024Updated last year
- ☆18Mar 23, 2023Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- ☆33Jul 31, 2025Updated 6 months ago
- Here I am trying to show you some cheat-sheet of nmap. Which may help you on penetration testing and bug hunting.☆20Dec 20, 2021Updated 4 years ago
- ☆24Jan 15, 2024Updated 2 years ago
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- An SSRF detector tool written in golang. I have fixed some errors and added some more payloads to it. But the tool credits go to z0idsec.☆45Feb 10, 2021Updated 5 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- ☆99Mar 6, 2023Updated 2 years ago
- It grep subdomains, email/username, build custom wordlist etc from gau results☆50Nov 4, 2022Updated 3 years ago
- Speed-up your hunting with google dorks🚀🚀☆21Sep 8, 2022Updated 3 years ago
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated last year
- ☆29Mar 4, 2025Updated 11 months ago
- Custom wordlist, updated regularly☆124Jan 25, 2026Updated 3 weeks ago
- Custom nuclei templates for bug hunting.....☆27May 30, 2024Updated last year
- A powerful subdomain enumeration tool that aggregates data from multiple sources to create comprehensive lists of root subdomains.☆43Dec 19, 2025Updated last month
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- Collect XSS vulnerable parameters from entire domain.☆155Jul 29, 2022Updated 3 years ago