SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆54Oct 1, 2015Updated 10 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆23Nov 22, 2019Updated 6 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Sep 23, 2015Updated 10 years ago
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- use at your own risk☆37Nov 23, 2019Updated 6 years ago
- Source code for Hacker101.com - a free online web and mobile security class.☆16Apr 28, 2022Updated 3 years ago
- ☆436Dec 2, 2022Updated 3 years ago
- Data from my Sunday streams☆75Jul 28, 2019Updated 6 years ago
- Yet another subdomain finder☆210Jan 20, 2020Updated 6 years ago
- hcidump for android☆11Jan 28, 2015Updated 11 years ago
- A script to set up a quick Ubuntu 17.10 x64 box with tools I use.☆1,236Jul 3, 2024Updated last year
- Tutorials and Things to Do while Hunting Vulnerability.☆20Sep 14, 2021Updated 4 years ago
- ☆478Jan 29, 2021Updated 5 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- qHooK is very simple python script (dependent on pydbg) which hooks user defined Win32 APIs in any process and monitor then while process…☆21Jan 31, 2015Updated 11 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- Okai ES-200B Scooter Unlocker☆16Dec 13, 2021Updated 4 years ago
- ☆16Mar 12, 2026Updated last week
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Aug 4, 2021Updated 4 years ago
- Generate r/AskReddit Reddit videos and upload them to YouTube automatically☆13Aug 25, 2023Updated 2 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13Sep 23, 2019Updated 6 years ago
- Toolkit for Active Directory security assessments.☆10Jun 4, 2024Updated last year
- AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS!☆10Dec 13, 2018Updated 7 years ago
- Here you'll find code for your DigiSpark. Download this Repository for awesome pranks that you can use on your friends!☆10Oct 15, 2020Updated 5 years ago
- This repo contain scripts written for finding subdomains using various available tools☆28Oct 21, 2020Updated 5 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- A list of resources for those interested in getting started in bug bounties☆11,906Jul 23, 2024Updated last year
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- A curated list of awesome Python frameworks, libraries, software and resources☆10Nov 28, 2022Updated 3 years ago
- Usermode emulation of x64 EAC☆31Apr 30, 2021Updated 4 years ago
- WiFi HID Injector - An USB Rubberducky / BadUSB On Steroids.☆27Aug 23, 2017Updated 8 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- An accessibility suite giving you control over what you read.☆14Dec 10, 2022Updated 3 years ago
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- A script to extract subdomains/emails for a given domain using SSL/TLS certificate dataset on Censys☆153Dec 7, 2022Updated 3 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆49May 1, 2022Updated 3 years ago