hmaverickadams / SecListsView external linksLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆23Jan 23, 2023Updated 3 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- ☆11Jan 7, 2022Updated 4 years ago
- Extract Windows Wi-Fi Passwords to Remote URL☆278Aug 12, 2022Updated 3 years ago
- A quick script to install google on linux☆22Jan 23, 2022Updated 4 years ago
- ☆28Apr 9, 2020Updated 5 years ago
- Same Pentest Resume☆143Mar 12, 2020Updated 5 years ago
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 3 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆16Apr 18, 2017Updated 8 years ago
- ☆434Feb 2, 2022Updated 4 years ago
- Violent Python scripts used in book and few other required files☆66Oct 21, 2018Updated 7 years ago
- The list of write-ups, articles, and PoC of various interesting in context of OSINT☆22Mar 13, 2025Updated 11 months ago
- ☆81May 4, 2020Updated 5 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Jan 12, 2026Updated last month
- List of advanced XSS payloads☆86Aug 23, 2016Updated 9 years ago
- ☆18Mar 14, 2025Updated 11 months ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- ☆11Feb 28, 2022Updated 3 years ago
- FAQ Guide for Practical Ethical Hacking Udemy Course☆189Apr 26, 2020Updated 5 years ago
- Identify technology on websites.☆50Jun 18, 2023Updated 2 years ago
- Rapid Response sample Foundry app☆14Updated this week
- ☆24Jul 27, 2024Updated last year
- A curated toolkit for Open-Source Intelligence (OSINT) investigations. This repository contains a collection of scripts, resources, and m…☆93Jan 28, 2026Updated 2 weeks ago
- TinyRP is a simple lightweight HTTP reverse proxy made in golang☆12Dec 4, 2022Updated 3 years ago
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Jul 10, 2024Updated last year
- Ready made ducky scripts to use in nethunter Duckhunter HID attack to perform bad usb attack right at your fingertips.☆10Nov 25, 2025Updated 2 months ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Tactical Observation of RF GNSS Interference☆14Jun 25, 2020Updated 5 years ago
- ☆11Jan 5, 2021Updated 5 years ago
- Python script for querying the apple servers for the location of wifi access points☆14May 31, 2024Updated last year
- ☆15Jan 5, 2025Updated last year
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆10Dec 5, 2019Updated 6 years ago
- Stocks portfolio tracker based on Google Sheets☆14Jan 30, 2022Updated 4 years ago
- Tutorial for SICSS-Istanbul☆11Jul 6, 2020Updated 5 years ago
- A tool for reverse engineering Android apk files 此代码未更改☆11May 24, 2015Updated 10 years ago
- A list of Github users who distribute tools and tutorials on OSINT (as well as hacking, pentest, and forensics)☆13Oct 15, 2023Updated 2 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- ☆18Mar 17, 2025Updated 10 months ago
- Mastering Internet of Things by Packt☆11Jan 30, 2023Updated 3 years ago
- 🤖 The Modern Port Scanner 🤖☆14Nov 5, 2024Updated last year