SecLists - The Security Tester's Companion

SecLists 🛡️

SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, gathered in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.

Created by Daniel Miessler, Jason Haddix, Ignacio Portal, and g0tmi1k with contributions from the community.
Supported by the community and partners such as Warp, an AI-enabled terminal for macOS, Linux, and Windows.

🎯 What’s Inside

SecLists contains comprehensive wordlists for:

  • Usernames - Common usernames for brute force attacks
  • Passwords - Password lists for dictionary attacks
  • URLs - Common paths and files for web application testing
  • Fuzzing Payloads - Input validation testing payloads
  • Web Shells - Various web shell implementations
  • Sensitive Data Patterns - Patterns for finding exposed data

📦 Installation

Quick Download

# Download as ZIP
wget -O SecLists.zip https://github.com/danielmiessler/SecLists/archive/master.zip
unzip SecLists.zip

Git Clone

# Clone repository (full history)
git clone https://github.com/danielmiessler/SecLists.git

# Clone without history (faster)
git clone --depth 1 https://github.com/danielmiessler/SecLists.git

Package Managers

# Kali Linux
sudo apt -y install seclists

# BlackArch
sudo pacman -S seclists
Note: Downloading this repository is likely to cause a false-positive alarm by your anti-virus software. The files are not harmful, but they contain patterns that security software may flag.

🚀 Usage Examples

# Use with Gobuster for directory brute forcing
gobuster dir -u https://example.com -w /path/to/SecLists/Discovery/Web-Content/directory-list-2.3-medium.txt

# Use with Hydra for password attacks
hydra -l admin -P /path/to/SecLists/Passwords/Common-Credentials/10-million-password-list-top-1000.txt ssh://target

# Use with Burp Suite for fuzzing
# Import wordlists from SecLists/Fuzzing/ directory

📊 Project Structure

  graph TD
    A[SecLists] --> B[Discovery]
    A --> C[Fuzzing]
    A --> D[Passwords]
    A --> E[Pattern-Matching]
    A --> F[Payloads]
    A --> G[Usernames]
    A --> H[Web-Shells]

    B --> B1[DNS]
    B --> B2[Web-Content]
    B --> B3[Infrastructure]

    C --> C1[XSS]
    C --> C2[SQLi]
    C --> C3[Command-Injection]

    D --> D1[Common-Credentials]
    D --> D2[Leaked-Databases]
    D --> D3[Permutations]

🔗 Similar Projects

  • Assetnote Wordlists - Automated wordlist generation
  • FuzzDB - Application security fuzzing data
  • PayloadsAllTheThings - Web application security payloads

📄 License

MIT License - Free to use in commercial and personal projects

🤝 Contributing

Contributions are welcome! Please read our contributing guidelines and submit pull requests for new wordlists or improvements.

📚 Resources