mubix / SecListsLinks
SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆12Updated 11 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- Veil Catapult is no longer supported☆76Updated 9 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- PowerShell scripts for the PoshSec Framework☆22Updated 10 years ago
- Scripts that are suited for blue teams☆33Updated 9 years ago
- #Pwn Linux (CrunchPwn) is a penetration testing repository/addition for CrunchBang Linux.☆27Updated 11 years ago
- Registry Based Artifact Collection and Correlation☆10Updated 9 years ago
- ☆48Updated 9 years ago
- A curated list of amazingly awesome open source sysadmin resources inspired by Awesome PHP.☆19Updated 11 years ago
- See here:☆42Updated 12 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Easy Window domain access☆51Updated 11 years ago
- Windows PowerShell domain scanning tool☆54Updated 9 years ago
- A tool to generate graph and other output from NMAP XML files☆116Updated 6 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 9 years ago
- Various Cheat Sheets related to development and security☆143Updated 4 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆103Updated 8 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 9 years ago
- ☆43Updated 8 years ago
- ☆10Updated 10 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- ☆42Updated 11 years ago
- Attack Knowledge Base☆100Updated 8 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆12Updated 8 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆72Updated 9 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆95Updated 13 years ago
- Why hunt when you can seine?☆21Updated 10 years ago