hmaverickadams / SecListsView external linksLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆23Jan 23, 2023Updated 3 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- ☆11Jan 7, 2022Updated 4 years ago
- Extract Windows Wi-Fi Passwords to Remote URL☆278Aug 12, 2022Updated 3 years ago
- ☆28Apr 9, 2020Updated 5 years ago
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 3 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆16Apr 18, 2017Updated 8 years ago
- ☆434Feb 2, 2022Updated 4 years ago
- Violent Python scripts used in book and few other required files☆66Oct 21, 2018Updated 7 years ago
- The list of write-ups, articles, and PoC of various interesting in context of OSINT☆23Mar 13, 2025Updated 11 months ago
- ☆81May 4, 2020Updated 5 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Jan 12, 2026Updated last month
- List of advanced XSS payloads☆86Aug 23, 2016Updated 9 years ago
- Arduino Kitabimizda Gecen Ornek Kodlar☆10Feb 23, 2017Updated 8 years ago
- ☆11Feb 28, 2022Updated 3 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- ☆18Mar 14, 2025Updated 11 months ago
- DOS Program Development☆12Nov 9, 2022Updated 3 years ago
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆23Jan 17, 2026Updated 3 weeks ago
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆10Nov 25, 2025Updated 2 months ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- ☆24Jul 27, 2024Updated last year
- An OSINT tool for IT ninjas.☆11Jul 31, 2024Updated last year
- Rapid Response sample Foundry app☆14Updated this week
- TinyRP is a simple lightweight HTTP reverse proxy made in golang☆12Dec 4, 2022Updated 3 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Mastering Internet of Things by Packt☆11Jan 30, 2023Updated 3 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- ☆11Feb 8, 2026Updated last week
- ☆18Mar 17, 2025Updated 10 months ago
- gnuplot ported for android☆19Jan 11, 2018Updated 8 years ago
- A curated collection of amazing software, libraries, documents, books, resources, and other cool security-related content.☆13Nov 13, 2024Updated last year
- Tactical Observation of RF GNSS Interference☆14Jun 25, 2020Updated 5 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 5 months ago
- ☆19Dec 4, 2025Updated 2 months ago
- Stocks portfolio tracker based on Google Sheets☆14Jan 30, 2022Updated 4 years ago
- ☆11Jan 5, 2021Updated 5 years ago
- 🗺 A map of OSINT tools.☆11Aug 2, 2023Updated 2 years ago