infosecn1nja / SecListsLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆12Updated 6 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆15Updated 6 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Updated 7 years ago
- A curated list of awesome threat detection and hunting resources☆18Updated 6 years ago
- A curated list of Awesome Threat Intelligence resources☆17Updated 6 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Cheat-Sheet of tools for penetration testing☆53Updated 2 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- Learning-Pentesting-With-Python☆20Updated 7 years ago
- Notes and Commands for CTFs☆23Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Small and highly portable detection tests.☆12Updated 7 years ago
- Offensive Security / Pentesting Cheat Sheets☆101Updated 7 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆83Updated 4 years ago
- ☆24Updated 5 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆91Updated 2 weeks ago
- Custom security distro for remote penetration testing☆55Updated 4 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆84Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Journey to Try Harder !!!☆33Updated 6 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- ☆53Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆65Updated 6 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated this week