576
SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. The goal is to enable a security tester to pull this repo onto a new testing box and have access to every type of list that may be needed.
SecLists Usage Example
root@kali:~# ls -lh /usr/share/seclists/
total 40K
drwxr-xr-x 6 root root 4.0K Mar 23 09:56 Discovery
drwxr-xr-x 3 root root 4.0K Mar 23 09:56 Fuzzing
drwxr-xr-x 2 root root 4.0K Mar 23 09:56 IOCs
drwxr-xr-x 2 root root 4.0K Mar 23 09:56 Miscellaneous
drwxr-xr-x 11 root root 4.0K Mar 23 09:56 Passwords
drwxr-xr-x 2 root root 4.0K Mar 23 09:56 Pattern-Matching
drwxr-xr-x 7 root root 4.0K Mar 23 09:56 Payloads
-rwxr-xr-x 1 root root 3.5K Mar 7 16:02 README.md
drwxr-xr-x 4 root root 4.0K Mar 23 09:56 Usernames
drwxr-xr-x 7 root root 4.0K Mar 23 09:56 Web-Shells
root@kali:~#
root@kali:~# tree -d /usr/share/seclists/
/usr/share/seclists/
├── Discovery
│ ├── DNS
│ ├── Infrastructure
│ ├── SNMP
│ └── Web-Content
│ ├── CMS
│ ├── SVNDigger
│ │ ├── cat
│ │ │ ├── Conf
│ │ │ ├── Database
│ │ │ ├── Language
│ │ │ └── Project
│ │ └── context
│ ├── URLs
│ └── Web-Services
├── Fuzzing
│ └── Polyglots
├── IOCs
├── Miscellaneous
├── Passwords
│ ├── Common-Credentials
│ ├── Cracked-Hashes
│ ├── Default-Credentials
│ ├── Honeypot-Captures
│ ├── Leaked-Databases
│ ├── Malware
│ ├── Permutations
│ ├── Software
│ └── WiFi-WPA
├── Pattern-Matching
├── Payloads
│ ├── Anti-Virus
│ ├── File-Names
│ ├── Images
│ ├── PHPInfo
│ └── Zip-Bombs
├── Usernames
│ ├── Honeypot-Captures
│ └── Names
└── Web-Shells
├── FuzzDB
├── JSP
├── laudanum-0.8
│ ├── asp
│ ├── aspx
│ ├── cfm
│ ├── jsp
│ │ └── warfiles
│ │ ├── META-INF
│ │ └── WEB-INF
│ └── php
├── PHP
└── WordPress
53 directories
root@kali:~#
Source:
Author: Daniel Miessler & Jason Haddix
License: MIT
