SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆23Jan 23, 2023Updated 3 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Jan 7, 2022Updated 4 years ago
- Violent Python scripts used in book and few other required files☆66Oct 21, 2018Updated 7 years ago
- ☆28Apr 9, 2020Updated 6 years ago
- ☆431Feb 2, 2022Updated 4 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆16Apr 18, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 4 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆110Oct 31, 2023Updated 2 years ago
- Identify technology on websites.☆65Jun 18, 2023Updated 2 years ago
- FAQ Guide for Practical Ethical Hacking Udemy Course☆191Apr 26, 2020Updated 6 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 3 months ago
- List of advanced XSS payloads☆86Aug 23, 2016Updated 9 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Apr 24, 2026Updated 2 weeks ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Catalog of security breaches☆24Mar 15, 2025Updated last year
- An OSINT tool for IT ninjas.☆11Jul 31, 2024Updated last year
- LoadHound — Lightweight load testing tool for SQL databases.☆17Aug 8, 2025Updated 9 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆267Jul 2, 2025Updated 10 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- A curated list of amazingly awesome OSINT☆15Oct 15, 2024Updated last year
- Becoming the Hacker, published by Packt☆41Jan 30, 2023Updated 3 years ago
- Arduino and Raspberry PI Development Kit☆10Jun 28, 2017Updated 8 years ago
- gnuplot ported for android☆19Jan 11, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆23Jan 28, 2019Updated 7 years ago
- BoltWire v6.03 vulnerable to "Improper Access Control"☆14Oct 31, 2023Updated 2 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- A tool for reverse engineering Android apk files 此代码未更改☆11May 24, 2015Updated 10 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ⚖️ R code to scrape the DoJ Capitol Breach Cases and daily data files of said scraped info via GH actions☆24Nov 6, 2024Updated last year
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆21Dec 22, 2022Updated 3 years ago
- Arduino Kitabimizda Gecen Ornek Kodlar☆10Feb 23, 2017Updated 9 years ago
- A list of Github users who distribute tools and tutorials on OSINT (as well as hacking, pentest, and forensics)☆16Oct 15, 2023Updated 2 years ago
- Mastering Internet of Things by Packt☆11Jan 30, 2023Updated 3 years ago
- ☆16Aug 2, 2025Updated 9 months ago
- List of OSINT Capture The Flag platforms☆56Mar 27, 2026Updated last month