jhaddix / SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆142Updated 7 years ago
Alternatives and similar repositories for SecLists:
Users that are interested in SecLists are comparing it to the libraries listed below
- ☆425Updated 2 years ago
- ☆181Updated 8 months ago
- ☆359Updated 3 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆274Updated 2 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆442Updated 4 years ago
- ☆82Updated 5 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆210Updated 4 years ago
- ☆210Updated 3 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆109Updated 7 years ago
- Yet another subdomain finder☆203Updated 5 years ago
- ☆373Updated 3 years ago
- Burp Extension for easily creating Wordlists☆210Updated 3 years ago
- ☆582Updated last year
- Leverages publicly available datasets from Google BigQuery to generate content discovery and subdomain wordlists☆723Updated 2 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆39Updated 6 years ago
- My personal bug bounty toolkit.☆163Updated 10 months ago
- A script that can resolve an input file of domains and scan them with masscan☆157Updated 4 years ago
- A DNS Bruteforcing Wordlist Generator☆357Updated 2 years ago
- Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts a…☆364Updated 2 years ago
- RepoToStoreBugBountyInfo☆304Updated 5 years ago
- Secret and/or credential patterns used for gf.☆241Updated 2 years ago
- The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices☆623Updated 5 months ago
- Recon Methodology☆91Updated 3 years ago
- The tools I have programmed to help me with bugbounty's☆115Updated 5 years ago
- Community curated list of template files for the nuclei engine to find security vulnerability and fingerprinting the targets.☆31Updated 4 years ago
- ☆126Updated 4 years ago
- PDF slides☆247Updated 3 years ago
- Random utilities from my security projects that might be useful to others☆179Updated 2 months ago
- A collection of templates for bug bounty reporting☆396Updated 3 years ago
- Simple shell script for automated domain recognition with some tools☆300Updated 4 years ago