mubix / SecLists
SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆12Updated 11 years ago
Alternatives and similar repositories for SecLists:
Users that are interested in SecLists are comparing it to the libraries listed below
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 11 years ago
- Veil Catapult is no longer supported☆76Updated 8 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- post-exploitation tools☆15Updated 7 years ago
- ☆10Updated 9 years ago
- ☆42Updated 10 years ago
- Easy Window domain access☆51Updated 10 years ago
- Automated enumeration☆30Updated 3 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- Attack Knowledge Base☆100Updated 7 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- Harvest FTP/POP/IMAP/HTTP/IRC creds☆167Updated 10 years ago
- Windows PowerShell domain scanning tool☆54Updated 8 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- Executes PowerShell from an unmanaged process☆28Updated 10 years ago
- Collection of scripts created while taking the SecurityTube Python Scripting Expert course☆56Updated 4 years ago
- ☆43Updated 8 years ago
- Automatically performs the SMB relay attack☆72Updated 8 years ago
- ☆53Updated 9 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- ☆50Updated 8 years ago
- Maltego with a twist of wireless☆25Updated 10 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago