SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆54Oct 1, 2015Updated 10 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆23Nov 22, 2019Updated 6 years ago
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- Source code for Hacker101.com - a free online web and mobile security class.☆16Apr 28, 2022Updated 3 years ago
- ☆436Dec 2, 2022Updated 3 years ago
- Data from my Sunday streams☆75Jul 28, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Yet another subdomain finder☆211Jan 20, 2020Updated 6 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- A script to set up a quick Ubuntu 17.10 x64 box with tools I use.☆1,235Jul 3, 2024Updated last year
- This script is intended to automate your reconnaissance process in an organized fashion☆2,030Aug 19, 2021Updated 4 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆20Sep 14, 2021Updated 4 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- ☆478Jan 29, 2021Updated 5 years ago
- ☆836Nov 13, 2023Updated 2 years ago
- ☆17Mar 29, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The all-in-one boot image tool.☆23Jan 9, 2015Updated 11 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- ☆27Dec 20, 2022Updated 3 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 6 years ago
- Gets a list of closest lime scooters to a location, or notifies you if one is close☆13May 2, 2023Updated 2 years ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆11Aug 4, 2021Updated 4 years ago
- Generate r/AskReddit Reddit videos and upload them to YouTube automatically☆13Aug 25, 2023Updated 2 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- a hackbot proof-of-concept☆42Feb 24, 2024Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A collection of awesome penetration testing resources, tools and other shiny things☆13Sep 23, 2019Updated 6 years ago
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆10Dec 13, 2018Updated 7 years ago
- Here you'll find code for your DigiSpark. Download this Repository for awesome pranks that you can use on your friends!☆10Oct 15, 2020Updated 5 years ago
- This repo contain scripts written for finding subdomains using various available tools☆28Oct 21, 2020Updated 5 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- A list of resources for those interested in getting started in bug bounties☆11,956Jul 23, 2024Updated last year
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Aug 23, 2017Updated 8 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A comprehensive VS Code snippet collection for Jinja2 and Django template engines.☆14Updated this week
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆154Dec 7, 2022Updated 3 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆49May 1, 2022Updated 3 years ago
- remount individual or all partitions on your Android device either as read-only or as read/write-able☆13Jun 17, 2023Updated 2 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- genAI agent providing security context, tooling for performing security analysis on CVE, components and more☆22Updated this week