Cyber Security Notes
Ctrlk
  • Command Basics
  • Burp
    • 👶Basics
    • Web Shell
    • Compatibility
    • Errors
    • SQLi Injection
  • Footprinting & Reconnaissance
    • ⏭️Commands
    • 👩‍💻Website tools for Reconnaissance
    • 🖥️Software Downloadables
    • 👣Overview
    • 🔎Google Advanced Search
    • 💬Social Engineering
    • 🤝Brand Reputation
    • ✉️Email
    • 🪞Website Mirroring
    • ❓OSINT Tool
    • 💻Domain Name
    • 📩ICMP - Internet Control Message Protocol
    • 🏓Tracert & Pathping
    • 🔬nslookup
  • OSINT - Open Source Inteligence
    • Overview
    • Passive Recon
    • Active Recon
  • Mobile
    • Extracting
  • Enumeration
    • Overview
    • Tools
    • Kali Linux
    • Protocols
    • Local Host Commands
    • Wordlist
  • DDos
    • hPing3
    • Hyenae
    • Ettercap
    • NTP Attacks
    • Deauthenticating Wireless Host
    • Goldeneye
  • session Hijacking
    • BeEF
    • Hijack with cookies
Powered by GitBook
On this page
  1. Enumeration

Wordlist

Popular Wordlists

Rockyou.txt

LogoWhere is Rockyou Location in Kali Linux, and what is it used for?Medium

Where to find rockyou.txt. in Kali Linux

locate rockyou.txt

in my case, it was here: -

/usr/share/wordlists/rockyou.txt.gz

Github Repos

Build a wordlist out of the source code

LogoGitHub - danielmiessler/Source2URL: Parse source code directories and output list of URLs that are then sent through a proxy.GitHub

This is an extension inside of Burp - couldn't find it.

LogoGitHub - 0xDexter0us/Scavenger: Burp extension to create target specific and tailored wordlist from burp history.GitHub

LogoGitHub - lc/gau: Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.GitHub
echo bugcrowd.com | gau | wordlistgen | -u

Uses historical data

LogoGitHub - xnl-h4ck3r/waymore: Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X!GitHub

PreviousLocal Host CommandsNexthPing3

Last updated 2 years ago