infosecn1nja / SecListsView external linksLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆14May 15, 2019Updated 6 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆10Jun 13, 2018Updated 7 years ago
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 6 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A curated list of awesome social engineering resources.☆15May 29, 2017Updated 8 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- ☆33May 11, 2021Updated 4 years ago
- Bxi crack version☆10Jul 7, 2022Updated 3 years ago
- ☆11Jun 28, 2022Updated 3 years ago
- A React component which can parse JSX and output rendered React Components.☆16May 21, 2019Updated 6 years ago
- Automate ISSG Tool Setups☆13Nov 21, 2024Updated last year
- ROBLOX Script - Collection of visuals / wall hacks (Tracers, ESP, Boxes (2D & 3D), Head Dots & Crosshair)☆14Feb 16, 2023Updated 2 years ago
- This tool combines the power of Ollama (Mistral) with your terminal to turn natural language into real shell commands. Whether you want t…☆17Jan 25, 2026Updated 2 weeks ago
- An OSINT tool to easily generate Facebook url's to access publicly available information from Facebook profiles☆12Feb 22, 2017Updated 8 years ago
- Weaponize Sailfish OS with Kali linux☆12Jan 15, 2020Updated 6 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆14Jan 25, 2026Updated 2 weeks ago
- ☆14May 9, 2023Updated 2 years ago
- An ongoing collection of awesome software, API libraries, checlists, best guidelines and resources and most important security countermea…☆14Nov 15, 2022Updated 3 years ago
- Gallery plugin for October CMS based on Magnific Popup☆11Apr 30, 2025Updated 9 months ago
- This repository contain all sources for Kaisen Linux alpha and beta ISO (packages, themes, icons, menus, launchers...)☆11Jun 8, 2020Updated 5 years ago
- this android application detects the fake towers(base stations)☆10Oct 5, 2017Updated 8 years ago
- The SDK assets for the XRTK☆10Sep 16, 2022Updated 3 years ago
- Restore iOS devices without updating via rootfilesystem DMG☆10Nov 9, 2018Updated 7 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- ☆11Oct 20, 2018Updated 7 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Generatrum Linguarum, a conlang word generator library☆11Mar 28, 2023Updated 2 years ago
- A tool to locate people using social engineering.☆11Mar 13, 2022Updated 3 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 3 weeks ago