SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
☆12Sep 19, 2023Updated 2 years ago
Alternatives and similar repositories for SecLists
Users that are interested in SecLists are comparing it to the libraries listed below
Sorting:
- A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.☆15Sep 19, 2023Updated 2 years ago
- Common Security Interview Questions with Answers☆31Jul 4, 2023Updated 2 years ago
- Implementing ISO/IEC 27001:2022, by EC-Council☆16Feb 20, 2026Updated last week
- This is a collection of stealers for educational purposes☆21Aug 13, 2025Updated 6 months ago
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- ☆10Nov 29, 2025Updated 3 months ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago
- Gatsby theme scarlet is a personal portfolio which features 3 slides, several beautiful shades of purple, and our star Scarlet.☆12Feb 24, 2026Updated last week
- Configurations to implement Wazuh☆12Nov 28, 2022Updated 3 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- Create LAMP Stack using terraform with AWS☆11Feb 15, 2023Updated 3 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 4 years ago
- CIS benchmark quickplay for rapid assessments of the NGFW☆13Jul 27, 2023Updated 2 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Jul 7, 2021Updated 4 years ago
- Application scanning component of OWASP PurpleTeam☆15Feb 12, 2023Updated 3 years ago
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- AWS CIS Controls module for terraform☆11Nov 16, 2023Updated 2 years ago
- Leverage the Intel® Distribution of OpenVINO™ Toolkit to fast-track development of high-performance computer vision and deep learning inf…☆10Jul 28, 2020Updated 5 years ago
- ☆13Jul 12, 2025Updated 7 months ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year
- AWS Cloudformation template for MongoDB cluster with replicas set and Automatic Scale, support Spot Instance.☆15Jul 9, 2025Updated 7 months ago
- Content for Dynatrace Cloud Automation related Observability Clinics☆15Aug 2, 2023Updated 2 years ago
- The Dynatrace Community has a lot of Tips & Tricks on how to more efficiently use the Dynatrace Observability Platform. This repository i…☆13Nov 24, 2025Updated 3 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.