A curated collection of testing methodologies, wordlists, references, and various resources for web penetration testing, security assessments, and ethical hacking. Lists have been sourced, modified, and optimized from multiple public repositories for practical, real-world use.
- Methodology — Various testing methodologies & checklists
- Password Lists — Default credentials, leaked passwords, and brute-force wordlists
- Fuzzing Wordlists — Files, directories, parameters, and web payloads
- Subdomain & DNS Enumeration — Lists for subdomain discovery and DNS record enumeration
- Web Exploitation — SQLi, XSS, LFI, SSRF, and related attack vectors
- Custom Lists — Modified and optimized variants for improved coverage
- References — Tips, tricks, and supplementary materials for pentesters and bug hunters
This repository is intended solely for ethical hacking, authorized security research, and legal testing. Unauthorized or illegal use is strictly prohibited. The author assumes no responsibility for misuse.
Built on top of several excellent public resources:
Suggestions and contributions are welcome — feel free to open an issue or PR.