trickest / wordlistsLinks
Real-world infosec wordlists, updated regularly
☆1,569Updated this week
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,275Updated 5 months ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆900Updated 4 months ago
- Rockyou for web fuzzing☆2,917Updated last month
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,352Updated 3 months ago
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,394Updated this week
- An XSS exploitation command-line interface and payload generator.☆1,396Updated 8 months ago
- A repository that includes all the important wordlists used while bug hunting.☆1,347Updated 2 years ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆2,229Updated last week
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆1,009Updated last year
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,530Updated 3 years ago
- A simple tool for bypassing file upload restrictions.☆879Updated last year
- declutters url lists for crawling/pentesting☆1,443Updated 7 months ago
- bypass-url-parser☆1,094Updated this week
- Automated & Manual Wordlists provided by Assetnote☆1,535Updated last week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,640Updated last year
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,002Updated 10 months ago
- Subdomain takeover vulnerability checker☆1,377Updated last year
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆913Updated 5 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆689Updated 2 years ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,222Updated last year
- Free, libre, effective, and data-driven wordlists for all!☆627Updated 4 years ago
- Payload Arsenal for Pentration Tester and Bug Bounty Hunters☆914Updated 2 years ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,239Updated 2 months ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,010Updated last month
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆961Updated last year
- An IIS short filename enumeration tool☆1,008Updated 10 months ago
- Useful Google Dorks for WebSecurity and Bug Bounty☆1,134Updated last year
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆708Updated last year
- Asset inventory of over 800 public bug bounty programs.☆1,460Updated 7 months ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆987Updated last year