mxrch / SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
☆12Updated 3 years ago
Alternatives and similar repositories for SecLists:
Users that are interested in SecLists are comparing it to the libraries listed below
- 🔮 Uncover parts of mutuals followers of an instagram private account☆15Updated 3 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Updated 4 years ago
- holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the…☆34Updated 4 years ago
- ☆32Updated 10 months ago
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆45Updated 5 years ago
- A curated list of awesome warez and piracy links☆27Updated 4 years ago
- Hacking Tools For All Debian-based OS☆49Updated 6 years ago
- 🔍sᴏᴄɪᴀʟ ᴍᴇᴅɪᴀ ʟᴏᴏᴋᴜᴘ🔍☆25Updated 3 years ago
- !!!WORLD'S 🌍 #1🥇 TOR HACKING SUITE!!! Designed to scan and exploit vulnerabilities within Tor hidden services. Vigilante allows most to…☆44Updated 2 years ago
- an osint automation tool written in Batchfile for lookups including person, phone number, email, license plate, and VIN. this tool only w…☆61Updated 4 years ago
- Bash script using hcxdumptool, hcxtools and hashcat to collect WPA2 handshakes and/or PMKIDs, convert them to hashcat format and perform …☆16Updated 5 years ago
- Smart pentesting toolkit for modern WPA/WPA2 networks ⚔️📡☆26Updated 4 years ago
- Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,docx,pptx,xlsx) belongi…☆15Updated 9 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆52Updated 7 years ago
- A swiss army knife for pentesting networks☆20Updated 2 years ago
- Complete React application of Numspy API.☆11Updated 4 years ago
- Phoneinfoga Maltego Transform☆111Updated last year
- Bypass Two-Factor-Authentication☆39Updated 7 years ago
- God's Eye - [GUI] Email, IP and Nickname OSINT & Password breach hunting tool.☆51Updated 2 years ago
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆33Updated 4 years ago
- Advanced information gathering & OSINT framework for phone numbers☆67Updated 4 years ago
- A Complete Phishing Tool☆35Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- SpyDork is a python dork generator.☆13Updated 2 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆14Updated last year
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- XSS Cookie Stealer | PROOF OF CONCEPT☆32Updated 2 years ago
- Its like airgeddon but better!☆58Updated 8 months ago
- Make a Fake wireless access point aka Evil Twin....Easily!!☆66Updated last year
- OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accu…☆20Updated 3 years ago