Collection of various wordlists
☆37May 11, 2019Updated 6 years ago
Alternatives and similar repositories for WordLists
Users that are interested in WordLists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Capture. Detonate. Collect☆14Sep 20, 2024Updated last year
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- A repository containing sample srop exploits and vulnerable binaries.☆12Sep 17, 2019Updated 6 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Aug 27, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- writeup of some ctf challs☆11Apr 20, 2025Updated 11 months ago
- Posion: es un script capaz de escanear hosts, MAC spoofing, realizar ataque de SYNflood y sniffear FTP.☆13Jun 23, 2022Updated 3 years ago
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- Simple network tools written with Scapy.☆23Mar 22, 2016Updated 10 years ago
- Create Cobalt Strike malleable C2 profiles with HTTPS configs☆18May 23, 2020Updated 5 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- Challenges I created for CTFs☆25Dec 21, 2025Updated 3 months ago
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- Extracted streama video player☆23Apr 6, 2023Updated 2 years ago
- PoC for hiding data within $MFT☆12Aug 14, 2014Updated 11 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- An organized collection of default passwords for various devices and services.☆43Dec 7, 2022Updated 3 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Mar 16, 2026Updated last week
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- IP range distributed scanner for vulnerable Hikvision cameras☆27Jul 10, 2019Updated 6 years ago
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- A Simple Password Protected Back Door written in Python3☆21Jul 1, 2023Updated 2 years ago
- Do DFIR work in a Windows Sandbox☆21Updated this week
- For Interview, OSCP proof of concept code during the course.☆16Jul 26, 2019Updated 6 years ago
- Single hashcat rule file containing all possible rules.☆10Oct 20, 2015Updated 10 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Beautiful landing page collections that will help your growth hacking effort developed using Asp.Net Core 2.2☆18Feb 20, 2019Updated 7 years ago
- A DFIR tool to analyze artifacts on macOS☆35Jan 18, 2021Updated 5 years ago
- Hikvision camera backdoor exploit for beef framework (hikvision versions 5.2.0 - 5.3.9)☆20Aug 12, 2020Updated 5 years ago
- Open-source, enterprise-grade threat modeling platform☆32Mar 21, 2026Updated last week
- Our backup exploitation technique: fuzzing for POVs!☆24Aug 20, 2016Updated 9 years ago