xajkep / wordlists
Infosec Wordlists and more.
☆818Updated last year
Alternatives and similar repositories for wordlists:
Users that are interested in wordlists are comparing it to the libraries listed below
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,171Updated 11 months ago
- OSINT tools and more but without API key☆1,312Updated 11 months ago
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆940Updated 8 months ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆456Updated 4 years ago
- Local file inclusion exploitation tool☆851Updated last year
- The fastest dork scanner written in Go.☆1,186Updated last year
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,193Updated last month
- A curated list wordlists for bruteforcing and fuzzing☆887Updated 6 months ago
- Making Favicon.ico based Recon Great again !☆1,167Updated last year
- Real-world infosec wordlists, updated regularly☆1,470Updated this week
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,110Updated 2 years ago
- The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information abo…☆1,556Updated 9 months ago
- Automated & Manual Wordlists provided by Assetnote☆1,404Updated 8 months ago
- Subdomain and target enumeration tool built for offensive security testing☆858Updated 9 months ago
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,113Updated 9 months ago
- declutters url lists for crawling/pentesting☆1,321Updated last month
- Shodan Dorks☆457Updated 2 years ago
- CeWL is a Custom Word List Generator☆2,163Updated 5 months ago
- Free, libre, effective, and data-driven wordlists for all!☆597Updated 3 years ago
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,235Updated 10 months ago
- PwnXSS: Vulnerability (XSS) scanner exploit☆768Updated 2 years ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆896Updated last year
- Quick SQLMap Tamper Suggester☆1,366Updated 2 years ago
- A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.☆1,787Updated 10 months ago
- Some files for bruteforcing certain things.☆1,261Updated last month
- A wordlist of API names for web application assessments☆801Updated last month
- A fuzzer for detecting open redirect vulnerabilities☆736Updated 9 months ago
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆223Updated 3 years ago
- A collection of hacks and one-off scripts☆2,245Updated 2 weeks ago
- XSS payloads designed to turn alert(1) into P1☆1,347Updated last year