michenriksen / SecListsLinks
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆13Updated 6 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 11 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 7 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- Trying to be the best tool to search for exploits in the terminal.☆11Updated 7 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆25Updated 4 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- This tool audits a website before hand and can exploit vulnerabilities if the website scanned has any.☆14Updated 11 years ago
- A script for easily building customized images of pentesting distros (Kali and ParrotSec).☆17Updated 4 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 11 months ago
- SIP hacking tools and scripts☆22Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆9Updated 7 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Automated Mass Exploiter☆12Updated 6 years ago
- Scripts related to offensiveosint.io☆23Updated 5 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- TheDorkbox Comprehensive collection of Google Dorks & OSINT techniques to find Confidential Data☆28Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 3 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- A collection of curated Java Deserialization Exploits☆10Updated 7 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 10 years ago
- Tools and scripts dedicated to Android application security☆50Updated 4 years ago