nahamsec / SecListsLinks
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆53Updated 10 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- Yet another subdomain finder☆206Updated 5 years ago
- The project contains multiple shell scripts for automating the tasks during recon.☆174Updated 2 years ago
- ☆434Updated 2 years ago
- A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily rep…☆254Updated 2 years ago
- This repository created for personal use and added tools from my latest blog post.☆352Updated 2 years ago
- In-depth DNS Enumeration and Network Mapping☆35Updated 6 years ago
- A script that can resolve an input file of domains and scan them with masscan☆155Updated 5 years ago
- A collection of templates for bug bounty reporting☆423Updated 5 months ago
- The tools I have programmed to help me with bugbounty's☆117Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆113Updated 8 years ago
- ☆474Updated 4 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆223Updated 8 years ago
- Simple shell script for automated domain recognition with some tools☆304Updated 4 years ago
- Trying to make automated recon for bug bounties☆255Updated 4 years ago
- Bugbounty scope tool☆330Updated 7 months ago
- bash scripting thing!☆195Updated last year
- this repo contains required files for web application pentests☆189Updated 8 years ago
- Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts a…☆367Updated 3 years ago
- Random utilities from my security projects that might be useful to others☆182Updated 8 months ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆235Updated 5 years ago
- Web Security Checklist (Bug Bounty & Pentesting)☆169Updated 3 months ago
- Tools and datas related to Bug Bounty.☆236Updated 3 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆43Updated 7 years ago
- A python script that finds endpoints in JavaScript files☆45Updated 6 years ago
- ☆246Updated 7 years ago
- Note: Going through a full re-write of the tooling so the current versions in the repo do not work!☆410Updated 5 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆452Updated 5 years ago
- Subdomain Takeover Scanner | Subdomain Takeover Tool | by 0x94☆364Updated 2 years ago
- My personal bug bounty toolkit.☆164Updated last year
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆43Updated 7 years ago