infosecn1nja / SecListsLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆13Updated 6 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Updated 6 years ago
- A curated list of awesome threat detection and hunting resources☆18Updated 6 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 7 years ago
- A curated list of Awesome Threat Intelligence resources☆16Updated 6 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆148Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆82Updated 5 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 4 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆64Updated last year
- Offensive Security / Pentesting Cheat Sheets☆100Updated 7 years ago
- Miscellaneous tools for BloodHound☆17Updated 3 years ago
- Small and highly portable detection tests.☆13Updated 7 years ago
- Penetration Testing/Security Cheatsheets☆61Updated 9 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆49Updated last week
- Notes and Commands for CTFs☆23Updated 5 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆51Updated 4 years ago
- Cheat-Sheet of tools for penetration testing☆56Updated 2 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆41Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- Learning-Pentesting-With-Python☆21Updated 6 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆14Updated 6 years ago
- ☆22Updated 9 years ago
- A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phis…☆15Updated 7 months ago