infosecn1nja / SecListsLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆13Updated 6 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆15Updated 6 years ago
- A curated list of awesome threat detection and hunting resources☆19Updated 6 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Updated 7 years ago
- A curated list of Awesome Threat Intelligence resources☆18Updated 6 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆41Updated 4 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆89Updated 6 years ago
- Offensive Security / Pentesting Cheat Sheets☆102Updated 7 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Notes and Commands for CTFs☆23Updated 5 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 4 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆65Updated 7 years ago
- Create Password lists for cracking lyrical passwords☆16Updated last year
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆85Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- Learning-Pentesting-With-Python☆19Updated 7 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆93Updated 2 months ago
- A curated list of awesome infosec resources.☆31Updated 10 years ago
- ☆25Updated 5 years ago
- Custom security distro for remote penetration testing☆56Updated 4 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆63Updated 10 years ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- ☆33Updated 10 months ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago