xajkep / wordlistsLinks
Infosec Wordlists and more.
☆916Updated 7 months ago
Alternatives and similar repositories for wordlists
Users that are interested in wordlists are comparing it to the libraries listed below
Sorting:
- A wordlist framework to fullfill your kinks with your wordlists. For security researchers, bug bounty and hackers.☆1,317Updated last month
- Local file inclusion exploitation tool☆917Updated 4 months ago
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆1,022Updated last year
- Real-world infosec wordlists, updated regularly☆1,621Updated this week
- A curated list of wordlists for bruteforcing and fuzzing☆1,189Updated 6 months ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,273Updated 11 months ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆917Updated 2 months ago
- Some files for bruteforcing certain things.☆1,391Updated last month
- Free, libre, effective, and data-driven wordlists for all!☆645Updated 4 years ago
- PwnXSS: Vulnerability (XSS) scanner exploit☆805Updated 3 years ago
- Web Fuzzer☆430Updated 2 years ago
- XSS payloads designed to turn alert(1) into P1☆1,388Updated 2 years ago
- Making Favicon.ico based Recon Great again !☆1,258Updated 2 years ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,277Updated last year
- The fastest dork scanner written in Go.☆1,271Updated last year
- Subdomain and target enumeration tool built for offensive security testing☆930Updated last year
- Repo of all the default wordlists included in Kali. Convienent if you're using something other than Kali.☆243Updated 3 years ago
- HostHunter a recon tool for discovering hostnames using OSINT techniques.☆1,149Updated 2 years ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆510Updated 5 years ago
- Software to identify the different types of hashes used to encrypt data and especially passwords☆628Updated last year
- Subdomain takeover vulnerability checker☆1,499Updated last year
- Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hu…☆2,309Updated last year
- A fuzzer for detecting open redirect vulnerabilities☆780Updated last year
- A repository that includes all the important wordlists used while bug hunting.☆1,370Updated 2 years ago
- Automated & Manual Wordlists provided by Assetnote☆1,593Updated last month
- A wordlist of API names for web application assessments☆863Updated 7 months ago
- A collection of hacks and one-off scripts☆2,414Updated 10 months ago
- Open Redirection Analyzer☆807Updated 2 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆929Updated 8 months ago
- A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus bu…☆571Updated 3 years ago