nahamsec / SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆52Updated 9 years ago
Alternatives and similar repositories for SecLists:
Users that are interested in SecLists are comparing it to the libraries listed below
- The tools I have programmed to help me with bugbounty's☆114Updated 5 years ago
- Random utilities from my security projects that might be useful to others☆179Updated last month
- The project contains multiple shell scripts for automating the tasks during recon.☆175Updated last year
- A script that can resolve an input file of domains and scan them with masscan☆157Updated 4 years ago
- Yet another subdomain finder☆202Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆109Updated 7 years ago
- ☆424Updated 2 years ago
- ☆124Updated 4 years ago
- Generates lists of live hosts and URLs for targeting, automating the usage of MassDNS, Masscan and nmap to filter out unreachable hosts a…☆364Updated 2 years ago
- Burp Extension for easily creating Wordlists☆211Updated 3 years ago
- Data from my Sunday streams☆73Updated 5 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆209Updated 4 years ago
- Python library and CLI for the Bug Bounty Recon API☆223Updated 3 years ago
- You can read the writeup on this script here☆193Updated 3 years ago
- Various Payload wordlists☆235Updated 4 years ago
- Trying to make automated recon for bug bounties☆252Updated 3 years ago
- Bugbounty scope tool☆325Updated last week
- A python script that finds endpoints in JavaScript files☆42Updated 5 years ago
- ☆58Updated last year
- ☆241Updated 6 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆235Updated 4 years ago
- ☆80Updated 5 years ago
- Bug Bounty Dork☆71Updated 3 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 9 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆39Updated 6 years ago
- Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SS…☆168Updated 4 years ago
- Cross Origin Resource Sharing MisConfiguration Scanner☆172Updated 3 years ago
- information gathering☆273Updated 11 months ago
- A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF☆165Updated 4 years ago
- Web Application recon automation☆124Updated 4 years ago