Comprehensive security wordlists & exploit payloads for penetration testers and security researchers.
This repository provides categorized wordlists and payloads for security assessments, including sensitive paths, exploit payloads, fuzzing wordlists, WAF bypass techniques, and more. Compatible with security tools like Burp Suite, FFUF, Dirsearch, Nuclei, SQLmap, etc.
Directory/File Path | Description |
---|---|
security-lists/ |
Main directory for security lists |
├── sensitive_paths/ | Sensitive file and directory paths |
│ ├── admin_panels.txt | List of admin panel paths |
│ ├── login_pages.txt | List of login page paths |
│ ├── api_endpoints.txt | List of API endpoints |
│ ├── error_pages.txt | List of error page paths |
│ ├── backups.txt | List of backup file paths |
│ ├── config_files.txt | List of configuration files |
│ ├── database_files.txt | List of databases paths |
├── technology_fingerprints/ | Fingerprints for CMS, frameworks, and servers |
│ ├── cms/ | List of CMS technologies |
│ │ ├── wordpress.txt | List of WordPress-specific fingerprints |
│ │ ├── joomla.txt |
List of Joomla-specific fingerprints |
│ │ ├── drupal.txt |
List of Drupal-specific fingerprints |
│ ├── frameworks/ |
List of frameworks |
│ │ ├── django.txt |
List of Django-specific fingerprints |
│ │ ├── laravel.txt |
List of Laravel-specific fingerprints |
│ ├── servers/ |
List of server technologies |
│ │ ├── apache.txt |
List of Apache-specific fingerprints |
│ │ ├── nginx.txt |
List of Nginx-specific fingerprints |
├── exploit_payloads/ |
Exploitation payloads |
│ ├── xss/ |
XSS payloads |
│ ├── sqli/ |
SQL Injection payloads |
│ ├── other/ |
Other exploit payloads |
├── unauthorized_access/ |
Default credentials, common users & passwords |
├── fuzzing_wordlists/ |
Wordlists for fuzzing directories, params, headers, etc. |
├── waf_bypass/ |
Techniques to bypass Web Application Firewalls (WAFs) |
├── misconfig_information_disclosure/ |
Lists for exposed sensitive files and misconfigurations |
└── README.md |
This file |
Use FFUF, Dirsearch, or similar tools to scan directories and files:
ffuf -w sensitive_paths/admin_panels.txt -u https://target.com/FUZZ
Use these payloads with security tools like Burp Suite, SQLmap, or manually:
sqlmap -u "https://target.com/index.php?id=1" --batch --file-read="exploit_payloads/sqli/union_based.txt"
Use wordlists for discovering subdomains, headers, and parameters:
wfuzz -w fuzzing_wordlists/parameters.txt -u "https://target.com/page.php?FUZZ=value"
✔️ Structured & Organized – Easy to navigate and use ✔️ Compatible with Popular Tools – Burp Suite, FFUF, SQLmap, etc. ✔️ Regularly Updated – Contributions and improvements welcome ✔️ Optimized for Security Researchers & Pentesters
We welcome contributions! To contribute:
- Fork the repository
- Create a new branch (
feature/update-wordlist
) - Commit your changes
- Submit a pull request 🚀
This repository is intended for educational and ethical penetration testing purposes only. Misuse of this information may lead to legal consequences. The author assumes no responsibility for any misuse or damage.
If you find this project useful, feel free to ⭐ star this repository and share it!