"ACCESS LIST" Bypass collections used during pentesting, gathered in one place. The list types include tools, usernames, passwords, combos, wordlists, Ai Jailbreaks, Dorks and many more.
-
Updated
Jun 21, 2025 - Python
"ACCESS LIST" Bypass collections used during pentesting, gathered in one place. The list types include tools, usernames, passwords, combos, wordlists, Ai Jailbreaks, Dorks and many more.
Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty Hunters! Unlock the power of comprehensive fuzzing with our meticulously curated Fuzzing Directory, a one-stop solution designed to streamline your penetration testing and bug bounty hunting endeavors.
Misr: The Ultimate Vulnerability Scanner
HashDown1.0 is an offline security tool used to generate different types of hashes and also know the hash type of a hashed string.
NetDeltaMonitor is a comprehensive network reconnaissance and port scanning tool designed with a focus on security and continuous monitoring.
A tool to scan your local network for IoT devices and checks for known vulnerabilities using the CVE database.
Password Strength Analysis Tool
A sniffing attack involves the illegal extraction of unencrypted data by capturing network traffic through packet sniffers. In this tool, the user will be given 4 options such as raw, summary, target, and host. The user can select any option and they can start sniffing the network. The user has to just enter the name of the interface.
DreamtestAI is an AI-powered secure code review tool that scans your codebase using modern LLMs and generates vulnerability reports in Markdown, JSON, or CSV format. Ideal for security analysts, auditors, or developers looking to automate secure code review.
Add a description, image, and links to the securitytools topic page so that developers can more easily learn about it.
To associate your repository with the securitytools topic, visit your repo's landing page and select "manage topics."