SecLists
PEASS-ng
Our great sponsors
SecLists | PEASS-ng | |
---|---|---|
177 | 90 | |
53,546 | 14,874 | |
- | 2.9% | |
9.6 | 8.5 | |
5 days ago | 5 days ago | |
PHP | C# | |
MIT License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
SecLists
-
Where can I find a large list of common usernames?
https://github.com/danielmiessler/SecLists/blob/master/Usernames/xato-net-10-million-usernames.txt is not enough usernames
-
DarkBeam leaks billions of email and password combinations
This reminds me of [0] where they maintain composite lists of frequently used passwords. Also in the repo is probably my favorite pull request ever [1].
[0] https://github.com/danielmiessler/SecLists
[1] https://github.com/danielmiessler/SecLists/pull/155
- Would you take this order?
-
What's the problem with my API?
Maybe swagger.txt
-
I had a machine running for two weeks on the public cloud. Every few seconds there was an automated SSH login attempt. Here is the full list of usernames - some of which are quite curious.
Typical of the sorts of information a tester/attacker might be using from: Daniel Miessler's SecLists
- How does one find a list of banned/breached passwords to add to our Azure Custom Password Block list?
-
[OC] I updated our famous password table for 2023
Oh, and then you have this.
-
Join Celebrations! Appwrite 1.3 Ships Relationships
You can now also enable a rule for password dictionary. Appwrite knows what are the most common passwords, and with this rule enabled, it will not allow you users to set any of those passwords. It prevents your users from having passwords like password, 123456678, or qwertyui. Appwrite currently knows the 10,000 most commonly used passwords thanks to the same list used by other industry-leading auth providers. You can check out the dictionary list on GitHub.
-
Help crack wpa2
Try wifite if you don’t know how to use hashcat it is pretty simple. Hashcat is pretty easy as well I am to lazy to get on my laptop right now but just get the right wordlist Seclist has a shit load of them https://github.com/danielmiessler/SecLists
-
Help me find the code
Fellow rust players know the way
PEASS-ng
-
Great enumeration scripts?
Once on a system, something like Linpeas or Winpeas would be useful: https://github.com/carlospolop/PEASS-ng
-
HackersToolKit.co - One-Stop Shop for Tool Commands for CTFs, bug bounty, and Penetration Testing
Reject internet, embrace man. TBH it is not usefull at all, it is just in manual or embedded in kali, like basic webshells for example. It is cool to do such thing as a little free time project to learn about hosting and developing a website, but usefulnes for broader audience is minimal I think. For everyday use https://book.hacktricks.xyz are the best in my opinion.
-
Allowed tools for OSCP
I'm taking my OSCP exam next Wednesday and was just wondering on what tools are actually prohibited and which are not. I'm specifically referring to linpeas, winpeas, seatbelt. I often times run these tools when I've exausted my enumeration methods for a quick find. Are these tools allowed on the AD set and the individual machines?
-
Qualified to write a technical book ?
Seems like a cart before horse situation. Why not just release the cheat sheet you have now and see how it does? I like Carlos Polop's approach with HackTricks -- https://book.hacktricks.xyz/ -- he offers previews of new content to his patrons.
-
For cycle inside a list
Hi I don't understand the self.files attribute in this code: https://github.com/carlospolop/PEASS-ng/blob/master/linPEAS/builder/src/fileRecord.py
- LinPEAS
-
What are the alternative tools for wmic on cmd?
I'd recommend poking around at github and see what you find. A good starting point is WinPEAS if you're looking for automation. Seatbelt might also be helpful
- What are the alternatives for wmic on cmd?
- Need an ex OSCP candidate to share their experiences.
-
Hack The Box - Vessel [Hard] - Walkthrough
Using linpeas I found some useful information over the user steven
What are some alternatives?
Probable-Wordlists - Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
lynis - Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
gobuster - Directory/File, DNS and VHost busting tool written in Go
warp-plus-cloudflare - Script for getting unlimited GB on Warp+ ( https://1.1.1.1/ ) [GET https://api.github.com/repos/ALIILAPRO/warp-plus-cloudflare: 403 - Repository access blocked]
wpscan - WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via [email protected]
pimpmykali - Kali Linux Fixes for Newly Imported VM's
big-list-of-naughty-strings - The Big List of Naughty Strings is a list of strings which have a high probability of causing issues when used as user-input data.
CCStopper - [Archived] Stops Adobe's pesky background apps and more 😉
btcrecover - An open source Bitcoin wallet password and seed recovery tool designed for the case where you already know most of your password/seed, but need assistance in trying different possible combinations.
GTFONow - Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
english-words - :memo: A text file containing 479k English words for all your dictionary/word-based projects e.g: auto-completion / autosuggestion
PayloadsAllTheThings - A list of useful payloads and bypass for Web Application Security and Pentest/CTF