list of usernames and email addresses for pentests
☆198Aug 14, 2022Updated 3 years ago
Alternatives and similar repositories for username-lists
Users that are interested in username-lists are comparing it to the libraries listed below
Sorting:
- Wordlist compiled from Twitter usernames☆18Aug 15, 2022Updated 3 years ago
- e2e Scanning research module☆22Mar 8, 2026Updated last week
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,283Mar 7, 2024Updated 2 years ago
- SQL Injection Tool☆73Sep 19, 2014Updated 11 years ago
- tools for analyzing strings from password lists☆59Aug 15, 2022Updated 3 years ago
- Command-line tool to detect email spoofing vulnerabilities by analyzing SPF and DMARC DNS records. Supports single and bulk domain checks…☆24Apr 8, 2025Updated 11 months ago
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆17Jul 24, 2021Updated 4 years ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆89Feb 14, 2024Updated 2 years ago
- Prototype Pollution Scanner☆139Apr 11, 2021Updated 4 years ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- ☆19Sep 18, 2023Updated 2 years ago
- tryhame rooms walkthrough☆62Feb 22, 2026Updated 3 weeks ago
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆17May 27, 2023Updated 2 years ago
- top usernames from azure survey 2025☆15Apr 25, 2025Updated 10 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆635Nov 6, 2021Updated 4 years ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆36Sep 12, 2023Updated 2 years ago
- wordlists for password cracking☆29Aug 15, 2022Updated 3 years ago
- DCTF 2022 Challenge and infrastructure repository☆10May 8, 2024Updated last year
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆392Aug 15, 2024Updated last year
- Burp request/response timer☆36Nov 8, 2017Updated 8 years ago
- ☆33Nov 3, 2020Updated 5 years ago
- 📚 A Curated List of Awesome Telegram OSINT Tools, Sites & Resources☆13Feb 11, 2022Updated 4 years ago
- Automatic SSTI detection tool with interactive interface☆1,424Jan 17, 2026Updated 2 months ago
- Code files for CSD 310☆15Aug 19, 2023Updated 2 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- ☆483Aug 21, 2025Updated 6 months ago
- ☆19Jul 29, 2022Updated 3 years ago
- All Solutions☆202May 19, 2024Updated last year
- Abertay CMP202 Project☆36May 7, 2021Updated 4 years ago
- Fetch all the URLs that the Wayback Machine knows about for a domain☆4,356May 1, 2024Updated last year
- CVE-2024-21413 PoC for THM Lab☆224Mar 13, 2024Updated 2 years ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- ☆11Dec 27, 2024Updated last year
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- ☆29Feb 24, 2021Updated 5 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆19Jun 9, 2023Updated 2 years ago
- The iOS Reloader is a weaponizing tool for jailbroken iOS devices. It facilitates the installation of a collection of tools on iOS device…☆17Sep 15, 2025Updated 6 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,867Dec 25, 2023Updated 2 years ago