• Stars
    star
    804
  • Rank 56,681 (Top 2 %)
  • Language
  • License
    MIT License
  • Created over 2 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Real-world infosec wordlists, updated regularly

Wordlists Tweet

Real-world infosec wordlists, updated regularly

Trickest Wordlists

Current Wordlists

Technologies

These wordlists are based on the source code of the CMSes/servers/frameworks listed here. The current wordlists include:

  • Wordpress
  • Joomla
  • Drupal
  • Magento
  • Ghost
  • Tomcat

There are 2 versions of each wordlist:

  • Base (example tomcat.txt): Lists the full paths of each file in the repository
webapps/examples/WEB-INF/classes/websocket/echo/servers.json
  • All levels (example tomcat-all-levels.txt): Includes all directory levels of the files in the base wordlist - if you have tried dsieve, this is going to look familiar! This wordlist will be larger than the base wordlist but it accounts for cases where the directory structure of the repository isn't mapped perfectly on the target.
webapps/examples/WEB-INF/classes/websocket/echo/servers.json
examples/WEB-INF/classes/websocket/echo/servers.json
WEB-INF/classes/websocket/echo/servers.json
websocket/echo/servers.json
echo/servers.json
servers.json

Robots

Inspired by Daniel Miessler's RobotsDisallowed project, these wordlists contain the robots.txt Allow and Disallow paths in the top 100, top 1000, and top 10000 websites according to Domcop's Open PageRank dataset.

Inventory Subdomains

This wordlist contains the subdomains found for each target on the Inventory project. It consists of 1.4 million words generated from the subdomains of over 50 public bug bounty programs.

Cloud Subdomains

This wordlist contains the subdomains found through enumerating cloud assets. It consists of 940k words generated from the subdomains extracted from the Common Names and Subject Alternative Names of over 7 million SSL certificates.

And more wordlists to come!

How it Works

Technologies

A Trickest workflow clones the repositories in technology-repositories.json, lists the paths of all their files, removes non-interesting files, generates combinations, and pushes the wordlists to this repository. Trickest Workflow

Robots

Another Trickest workflow gets the top 100, 1000, and 1000 websites from Domcop's Open PageRank dataset, uses meg to fetch their robots.txt files (Thanks, @tomnomnom!), removes irrelevant entries, cleans up the paths, and pushes the wordlists to this repository. Trickest Workflow

Contribution

All contributions/suggestions/questions are welcome! Feel free to create a new ticket via GitHub issues, tweet at us @trick3st, or join the conversation on Discord.

Build your own workflows!

We believe in the value of tinkering. Sign up for a demo on trickest.com to customize this workflow to your use case, get access to many more workflows, or build your own from scratch!

More Repositories

1

cve

Gather and update all available and newest CVEs with their PoC.
HTML
5,099
star
2

inventory

Asset inventory on public bug bounty programs.
Shell
700
star
3

resolvers

The most exhaustive list of reliable DNS resolvers.
420
star
4

zip

Monitoring the internet for new .zip domains
205
star
5

mksub

Generate tens of thousands of subdomain combinations in a matter of seconds
Go
191
star
6

dsieve

Filter and enrich a list of subdomains by level
Go
145
star
7

mkpath

Make URL path combinations using a wordlist
Go
140
star
8

find-gh-poc

Find CVE PoCs on GitHub
Go
110
star
9

log4j

Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.
104
star
10

insiders

Archive of Potential Insider Threats
101
star
11

containers

Automated privilege escalation of the world's most popular Docker images.
Shell
62
star
12

enumerepo

List all public repositories for (valid) GitHub usernames
Go
52
star
13

safe-harbour

security.txt collection of most popular world-wide domains
50
star
14

trickest-cli

Execute Trickest workflows right from your terminal
Go
45
star
15

recon-and-vulnerability-scanner-template

Create your own recon & vulnerability scanner with Trickest and GitHub
40
star
16

cloud

Monitoring the Cloud Landscape
26
star
17

mgwls

Combine words from two wordlist files and concatenate them with an optional delimiter
Go
23
star
18

scripts

Handy scripts and one-liners to make life easier
22
star
19

elasticsearch_index

Manage attack surface data on Elasticsearch
Python
17
star
20

packages

Automated compromise detection of the world's most popular packages
13
star
21

action

Github Action for Trickest Workflows
Shell
6
star