xajkep / wordlists
Infosec Wordlists and more.
☆830Updated last year
Alternatives and similar repositories for wordlists:
Users that are interested in wordlists are comparing it to the libraries listed below
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,185Updated last year
- Real-world infosec wordlists, updated regularly☆1,484Updated this week
- Rockyou for web fuzzing☆2,779Updated 2 months ago
- A curated list wordlists for bruteforcing and fuzzing☆899Updated 6 months ago
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆947Updated 9 months ago
- Automated & Manual Wordlists provided by Assetnote☆1,427Updated 8 months ago
- A repository that includes all the important wordlists used while bug hunting.☆1,282Updated 2 years ago
- A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus bu…☆562Updated 3 years ago
- The fastest dork scanner written in Go.☆1,193Updated last year
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆899Updated this week
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,115Updated 2 years ago
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,238Updated last week
- XSS payloads designed to turn alert(1) into P1☆1,361Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,141Updated 9 months ago
- Making Favicon.ico based Recon Great again !☆1,183Updated last year
- 🎯 XML External Entity (XXE) Injection Payload List☆1,168Updated 9 months ago
- 🎯 RFI/LFI Payload List☆580Updated 9 months ago
- This script is intended to automate your reconnaissance process in an organized fashion☆1,959Updated 3 years ago
- Local file inclusion exploitation tool☆861Updated last year
- CeWL is a Custom Word List Generator☆2,190Updated 5 months ago
- Quick SQLMap Tamper Suggester☆1,372Updated 2 years ago
- BBT - Bug Bounty Tools (examples💡)☆1,797Updated last year
- A wordlist of API names for web application assessments☆807Updated 2 months ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,230Updated last year
- Subdomain takeover vulnerability checker☆1,184Updated 7 months ago
- Automatic Enumeration Tool based in Open Source tools☆923Updated last year
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆224Updated 3 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,204Updated 2 months ago
- Free, libre, effective, and data-driven wordlists for all!☆600Updated 3 years ago
- OSINT tools and more but without API key☆1,323Updated last year