To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing pages and other malicious or sketch af financial/crypto fraud websites.
☆81Apr 1, 2026Updated last week
Alternatives and similar repositories for PhishingSecLists
Users that are interested in PhishingSecLists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A fresh feed of crypto phishing and crypto scam websites. Automatically updated daily/frequently.☆54Apr 3, 2026Updated last week
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- OpenPhish Community Phishing Feed☆24Updated this week
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- ☆21Mar 20, 2026Updated 2 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Fyyx Wallet Finder is a Python app that searches for cryptocurrency wallets with balances in BTC and ETH. It logs results/errors and save…☆12Jun 11, 2024Updated last year
- A Linkedin Activity date Finder☆67Feb 21, 2026Updated last month
- Dutch Government Bugbounty scope, subdomains and endpoints☆34Updated this week
- TRC20 Wallet Listen Events☆11Aug 30, 2023Updated 2 years ago
- Js File Scanner☆11Mar 30, 2021Updated 5 years ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆64Jul 23, 2025Updated 8 months ago
- Comunidade Brasileira de Cibersegurança☆24Oct 6, 2025Updated 6 months ago
- Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.☆79Apr 2, 2026Updated last week
- A command-line utility for performing reverse DNS lookups☆72Aug 10, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- r2inspect is a professional malware analysis framework that automates deep static inspection for PE, ELF, and Mach-O binaries using the r…☆49Mar 23, 2026Updated 2 weeks ago
- Machine-readable .txt blocklist of scam URLs and IP Addresses from the Global Anti Scam Organization (https://www.globalantiscam.org) web…☆35Mar 13, 2026Updated 3 weeks ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- The community app for eXch.cx website☆17Nov 22, 2024Updated last year
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆12Jul 24, 2025Updated 8 months ago
- Monitor collections of malicious Telegram bots used for phishing credential theft, to prevent frauds/dataleaks.☆16Jan 29, 2025Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- [Just for fun] Find exposed AWS keys (VALID KEYS ONLY) on github☆40Jul 17, 2025Updated 8 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A blazing fast, high performance implementation of AutoRecon in Rust. A multi-threaded network reconnaissance tool which performs automa…☆45Dec 30, 2024Updated last year
- a rough written "guide" compiled from years of ADHD brain notes - enjoy☆125Apr 29, 2025Updated 11 months ago
- ☆12Jun 24, 2023Updated 2 years ago
- ☆31Mar 21, 2023Updated 3 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 3 months ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- An open-source knowledge base for security researchers.☆18Jan 8, 2025Updated last year
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆19Mar 26, 2026Updated 2 weeks ago
- ☆24Mar 31, 2026Updated last week
- A powerful proxy checker that checks and evaluates proxies for speed, availability, and anonymity across multiple protocols (HTTP, HTTPS,…☆12Oct 31, 2025Updated 5 months ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆17Jan 7, 2025Updated last year
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Keyboard‑driven terminal app to view and manage users and groups. Browse accounts, see memberships, search, and make common changes: rena…☆24Nov 11, 2025Updated 4 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆83Sep 11, 2025Updated 6 months ago