Real-world infosec wordlists, updated regularly
☆1,746May 2, 2026Updated this week
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Rockyou for web fuzzing☆3,141Mar 11, 2026Updated last month
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,546Mar 8, 2026Updated last month
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,618Mar 8, 2026Updated last month
- Asset inventory of over 800 public bug bounty programs.☆1,543Feb 14, 2025Updated last year
- The most exhaustive list of reliable DNS resolvers.☆982Apr 24, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Filter and enrich a list of subdomains by level☆213Sep 25, 2023Updated 2 years ago
- Extract URLs, paths, secrets, and other interesting bits from JavaScript☆1,824May 22, 2024Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,481Apr 23, 2026Updated last week
- A repository that includes all the important wordlists used while bug hunting.☆1,400Mar 11, 2023Updated 3 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,165Apr 3, 2026Updated last month
- De-clutter a list of URLs☆387Mar 8, 2026Updated last month
- ☆880Dec 26, 2025Updated 4 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆91May 2, 2024Updated 2 years ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,511Jan 8, 2026Updated 3 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,340Aug 7, 2025Updated 8 months ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,985Oct 4, 2025Updated 7 months ago
- i will upload more templates here to share with the comunity.☆570Apr 17, 2024Updated 2 years ago
- fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.☆939Aug 24, 2023Updated 2 years ago
- Puredns is a fast domain resolver and subdomain bruteforcing tool that can accurately filter out wildcard subdomains and DNS poisoned ent…☆2,163Feb 23, 2026Updated 2 months ago
- Community edition nuclei templates, a simple tool that allows you to organize all the Nuclei templates offered by the community in one pl…☆1,042Aug 23, 2025Updated 8 months ago
- Hidden parameters discovery suite☆2,050Sep 8, 2024Updated last year
- User-Agent , X-Forwarded-For and Referer SQLI Fuzzer☆384May 19, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,197Aug 14, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,348Mar 6, 2026Updated last month
- 1337 Wordlists for Bug Bounty Hunting☆956Updated this week
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,606Apr 12, 2026Updated 3 weeks ago
- declutters url lists for crawling/pentesting☆1,551Feb 23, 2025Updated last year
- All about bug bounty (bypasses, payloads, and etc)☆6,716Sep 8, 2023Updated 2 years ago
- 70k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒☆1,231Updated this week
- An IIS short filename enumeration tool☆1,153Nov 25, 2024Updated last year
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,110Jul 29, 2024Updated last year
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,959Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Generate tens of thousands of subdomain combinations in a matter of seconds☆275Sep 25, 2023Updated 2 years ago
- ☆383May 17, 2023Updated 2 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆1,076Mar 24, 2026Updated last month
- Quickly discover exposed hosts on the internet using multiple search engines.☆2,907Updated this week
- Gotator is a tool to generate DNS wordlists through permutations.☆515Jul 17, 2022Updated 3 years ago
- Contextual Content Discovery Tool☆3,158Apr 29, 2024Updated 2 years ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆756Dec 19, 2023Updated 2 years ago