trickest / wordlistsLinks
Real-world infosec wordlists, updated regularly
☆1,603Updated this week
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,307Updated last week
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆914Updated 7 months ago
- An XSS exploitation command-line interface and payload generator.☆1,404Updated 11 months ago
- A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target☆1,445Updated this week
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,394Updated 6 months ago
- Rockyou for web fuzzing☆2,975Updated 4 months ago
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆1,019Updated last year
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!☆2,436Updated this week
- A repository that includes all the important wordlists used while bug hunting.☆1,365Updated 2 years ago
- bypass-url-parser☆1,105Updated last week
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,709Updated last year
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,553Updated 3 years ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆741Updated 2 years ago
- declutters url lists for crawling/pentesting☆1,509Updated 10 months ago
- Subdomain takeover vulnerability checker☆1,473Updated last year
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,269Updated last year
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆916Updated last month
- A simple tool for bypassing file upload restrictions.☆889Updated last year
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆972Updated last year
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆732Updated last year
- Payload Arsenal for Pentration Tester and Bug Bounty Hunters☆913Updated 3 weeks ago
- Useful Google Dorks for WebSecurity and Bug Bounty☆1,149Updated last year
- Sticky notes for pentesting, bug bounty, CTF.☆765Updated 5 months ago
- Automated & Manual Wordlists provided by Assetnote☆1,585Updated last month
- Asset inventory of over 800 public bug bounty programs.☆1,504Updated 10 months ago
- Free, libre, effective, and data-driven wordlists for all!☆641Updated 4 years ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,032Updated 4 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,271Updated 4 months ago
- An IIS short filename enumeration tool☆1,051Updated last year
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,063Updated last year