Skip to content

Commit badbf27

Browse files
README Drama.
1 parent 788cdb8 commit badbf27

File tree

2 files changed

+56
-4
lines changed

2 files changed

+56
-4
lines changed

OLDREADME.md

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
![seclists.png](https://danielmiessler.com/images/seclists-long.png "seclists.png")
2+
3+
# About
4+
5+
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. The goal is to enable a security tester to pull this repo onto a new testing box and have access to every type of list that may be needed.
6+
7+
This project is maintained by [Daniel Miessler](http://www.danielmiessler.com/ "Daniel Miessler") and [Jason Haddix](http://www.securityaegis.com "Jason Haddix").
8+
9+
## Contributing
10+
11+
If you have any ideas for things we should include, please use one of the following methods to submit them:
12+
13+
1. Send us pull requests
14+
2. Create an issue in the project (right side)
15+
3. Send us links through the issues feature, and we'll parse and incorporate them
16+
3. Email daniel.miessler@owasp.org or jason.haddix@owasp.org with content to add
17+
18+
Significant effort is made to give attribution for these lists whenever possible, and if you are a list owner or know who the original author/curator is, please let us know so we can give proper credit.
19+
20+
### Attribution
21+
22+
- Adam Muntner and for the FuzzDB content, including all authors from the FuzzDB project
23+
- Ron Bowes of SkullSecurity for collaborating and including all his lists here
24+
- Clarkson University for their research that led to the Clarkson list
25+
- All the authors listed in the XSS with context doc, which was found on pastebin and added to by us
26+
- Ferruh Mavitina for the beginnings of the LFI Fuzz list
27+
- Kevin Johnson for laudnaum shells
28+
- RSnake for fierce hostname list
29+
- Charlie Campbell for Spanish word list, numerous other contributions
30+
- Rob Fuller for the IZMY list
31+
- Mark Burnett for the 10 million passwords list
32+
- shipCod3 for an SSH user/pass list
33+
- Steve Crapo for doing splitting work on a number of large lists
34+
- Thanks to Blessen Thomas for recommending Mario's/cure53's XSS vectors
35+
- Thanks to Danny Chrastil for submitting an anonymous JSON fuzzing list
36+
- Many thanks to geekspeed, EricSB, lukebeer, patrickmollohan, g0tmi1k, albinowax, and kurobeats for submitting via pull requests
37+
- Special thanks to shipcod3 for MANY contributions!
38+
- Thanks to Samar Dhwoj Acharya for allowing his Github Dorks content to be included!
39+
- Thanks to Liam Somerville for the excellent list of default passwords
40+
- Great thanks to Michael Hendriksen for allowing us to include his Gitrob project's signatures
41+
- Honored to have @Brutelogic's brilliant XSS Cheatsheet added to the Fuzzing section!
42+
- Added 0xsobky's Ultimate XSS Polyglot!
43+
44+
This project stays great because of care and love from the community, and we will never forget that.

README.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
1-
![seclists.png](https://danielmiessler.com/images/seclists-long.png "seclists.png")
1+
![seclists.png](https://danielmiessler.com/images/seclists-long.png "seclists.png")
22

33
# About
44

55
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. The goal is to enable a security tester to pull this repo onto a new testing box and have access to every type of list that may be needed.
66

7-
This project is maintained by [Daniel Miessler](http://www.danielmiessler.com/ "Daniel Miessler") and [Jason Haddix](http://www.securityaegis.com "Jason Haddix").
7+
This project is maintained by [Daniel Miessler](http://www.danielmiessler.com/ "Daniel Miessler") and [Jason Haddix](http://www.securityaegis.com "Jason Haddix").
88

99
## Contributing
1010

@@ -25,7 +25,7 @@ Significant effort is made to give attribution for these lists whenever possible
2525
- All the authors listed in the XSS with context doc, which was found on pastebin and added to by us
2626
- Ferruh Mavitina for the beginnings of the LFI Fuzz list
2727
- Kevin Johnson for laudnaum shells
28-
- RSnake for fierce hostname list
28+
- RSnake for fierce hostname list
2929
- Charlie Campbell for Spanish word list, numerous other contributions
3030
- Rob Fuller for the IZMY list
3131
- Mark Burnett for the 10 million passwords list
@@ -37,8 +37,16 @@ Significant effort is made to give attribution for these lists whenever possible
3737
- Special thanks to shipcod3 for MANY contributions!
3838
- Thanks to Samar Dhwoj Acharya for allowing his Github Dorks content to be included!
3939
- Thanks to Liam Somerville for the excellent list of default passwords
40-
- Great thanks to Michael Hendriksen for allowing us to include his Gitrob project's signatures
40+
- Great thanks to Michael Henriksen for allowing us to include his Gitrob project's signatures
4141
- Honored to have @Brutelogic's brilliant XSS Cheatsheet added to the Fuzzing section!
4242
- Added 0xsobky's Ultimate XSS Polyglot!
4343

4444
This project stays great because of care and love from the community, and we will never forget that.
45+
46+
## Licensing
47+
48+
This project is licensed under the MIT license.
49+
50+
#### Note
51+
52+
Downloading this repository is likely to cause a false-positive alarm by your antivirus or antimalware software, the filepath should be whitelisted. There is nothing in Seclists or FuzzDB that can harm your computer as-is, however it's not recommended to store these files on a server or other important system due to the risk of local file include attacks.

0 commit comments

Comments
 (0)