list of usernames and email addresses for pentests
☆213Aug 14, 2022Updated 3 years ago
Alternatives and similar repositories for username-lists
Users that are interested in username-lists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wordlist compiled from Twitter usernames☆18Aug 15, 2022Updated 3 years ago
- e2e Scanning research module☆25Mar 26, 2026Updated last month
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,361Mar 7, 2024Updated 2 years ago
- SQL Injection Tool☆75Sep 19, 2014Updated 11 years ago
- FREE 350+ Tryhackme Rooms☆13Apr 14, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- tools for analyzing strings from password lists☆59Aug 15, 2022Updated 3 years ago
- Command-line tool to detect email spoofing vulnerabilities by analyzing SPF and DMARC DNS records. Supports single and bulk domain checks…☆28Apr 11, 2026Updated last month
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆18Jul 24, 2021Updated 4 years ago
- Prototype Pollution Scanner☆142Apr 11, 2021Updated 5 years ago
- :')☆47May 7, 2026Updated last week
- ☆19Sep 18, 2023Updated 2 years ago
- tryhame rooms walkthrough☆63Apr 22, 2026Updated 3 weeks ago
- Scripts for Pentesting☆14May 29, 2025Updated 11 months ago
- Reverse Shell Exploit for Searchor <= 2.4.2 (2.4.0)☆18May 27, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Dump WiFi passwords on Windows 10☆23Jan 25, 2018Updated 8 years ago
- A workshop for students that want to learn the basics of Arduino.☆16Oct 5, 2020Updated 5 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆651Nov 6, 2021Updated 4 years ago
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆37Sep 12, 2023Updated 2 years ago
- DCTF 2022 Challenge and infrastructure repository☆10May 8, 2024Updated 2 years ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆394Aug 15, 2024Updated last year
- Burp request/response timer☆37Nov 8, 2017Updated 8 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- ☆11Dec 8, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- ☆516Aug 21, 2025Updated 8 months ago
- All Solutions☆215May 19, 2024Updated 2 years ago
- Cura 3D in a Docker container, Web UI☆14Jul 15, 2022Updated 3 years ago
- Abertay CMP202 Project☆36May 7, 2021Updated 5 years ago
- Fetch all the URLs that the Wayback Machine knows about for a domain☆4,445May 1, 2024Updated 2 years ago
- Exploit for CVE-2024-27198 - TeamCity Server☆37Dec 19, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆11Dec 27, 2024Updated last year
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 9 months ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- The iOS Reloader is a weaponizing tool for jailbroken iOS devices. It facilitates the installation of a collection of tools on iOS device…☆16Sep 15, 2025Updated 8 months ago
- ☆16Mar 3, 2025Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,919Sep 6, 2023Updated 2 years ago
- Proof of Concept code of the Shoplift code☆41Oct 4, 2021Updated 4 years ago