infosecn1nja / SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆13Updated 5 years ago
Alternatives and similar repositories for SecLists:
Users that are interested in SecLists are comparing it to the libraries listed below
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆15Updated 5 years ago
- A curated list of awesome threat detection and hunting resources☆18Updated 5 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 6 years ago
- A curated list of Awesome Threat Intelligence resources☆16Updated 5 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- Notes and Commands for CTFs☆21Updated 4 years ago
- Small and highly portable detection tests.☆13Updated 6 years ago
- ☆34Updated 3 weeks ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 3 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆41Updated 4 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆13Updated 2 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A Collection of Email and Landing Page Templates for Use with Gophish☆30Updated 7 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆16Updated 6 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- scripts to setup environments for red/blue teams.☆16Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆32Updated 4 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆26Updated 4 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆16Updated 2 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated last year
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Windows Penetration Testing Toolkit☆14Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆76Updated 4 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated last year
- A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phis…☆14Updated last month
- Install popular tools used while pentesting & playing labs☆11Updated 3 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago