SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆14May 15, 2019Updated 6 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆10Jun 13, 2018Updated 7 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 7 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆15May 29, 2020Updated 5 years ago
- A curated list of Docker resources and projects☆16Nov 15, 2025Updated 5 months ago
- abusing misconfiguration for AD with LAPS☆11Jan 25, 2024Updated 2 years ago
- ☆34May 11, 2021Updated 4 years ago
- Hack South is a South Africa-based community for infosec professionals, security researchers, and students sharing insights, advice, and …☆14Nov 16, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- A cheatsheet and mindmap for CRTO certification☆16Mar 22, 2023Updated 3 years ago
- Gallery plugin for October CMS based on Magnific Popup☆11Apr 30, 2025Updated 11 months ago
- Yet another awesome fuzzers list☆15Oct 25, 2024Updated last year
- Ready-to-use n8n automation workflows for business, AI, and productivity. Instantly boost efficiency with 22 templates—no coding needed!☆32Aug 8, 2025Updated 8 months ago
- HackIgniter, PHP CodeIgniter Framework'ü üzerinde kodlanmış zafiyetli bir web uygulamasıdır. Uygulama üzerinde bulunan zafiyetler, sızma …☆16Sep 18, 2021Updated 4 years ago
- Simple HTTP proxy in one Python file, with throttling and header/content dumping☆24Oct 1, 2009Updated 16 years ago
- A React component which can parse JSX and output rendered React Components.☆16May 21, 2019Updated 6 years ago
- Subdomain crawler with wordlist using python☆14Mar 22, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- nmapcli is a tool written in Python with pre-defined scan templates to automate Nmap scans☆11Sep 10, 2017Updated 8 years ago
- Create a image slider for your website using device independent design and advance customization options.☆12Oct 2, 2020Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆618Sep 14, 2019Updated 6 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- learning related projects☆17Jan 26, 2015Updated 11 years ago
- A simple powershell script which gives handy compliance report.☆19Nov 27, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- (Yet another) comical and extensible chat bot.☆10Dec 14, 2022Updated 3 years ago
- Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️☆26Jul 22, 2022Updated 3 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- The SDK assets for the XRTK☆10Sep 16, 2022Updated 3 years ago
- Anubis 7.0☆27Sep 28, 2024Updated last year
- Scripts for Pentesting☆14May 29, 2025Updated 10 months ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Jul 2, 2018Updated 7 years ago