Wordlists Repository

Comprehensive collection of the most used and best wordlists for penetration testing

Quick Install SecLists (All Wordlists)

$ git clone https://github.com/danielmiessler/SecLists.git ~/wordlists/SecLists
$ sudo apt-get install wordlists && gunzip /usr/share/wordlists/rockyou.txt.gz

Best & Most Essential Wordlists

SecLists

BEST

The ultimate collection of all types of lists used during security assessments. Includes passwords, usernames, URLs, sensitive data patterns, fuzzing payloads, web shells, and much more.

1000+ files ~1GB 52k+ stars

RockYou.txt

POPULAR

The most famous password wordlist. Contains 14+ million passwords from the RockYou data breach. Essential for password cracking and authentication testing.

14.3M entries 133MB Most Used

Dirbuster Wordlists

BEST

Classic directory and file brute-forcing wordlists. Perfect for web application enumeration and discovering hidden directories, files, and endpoints.

Multiple sizes Web Focused Verified

FuzzDB

BEST

Comprehensive fuzzing patterns and payloads for application security testing. Contains attack patterns for XSS, SQLi, LDAP injection, and more.

Attack Patterns Security 8k+ stars

Assetnote Wordlists

POPULAR

Automated wordlist updates based on real-world data. Contains curated lists for subdomain enumeration and content discovery.

Auto-updated Real Data Top Quality

PayloadsAllTheThings

BEST

Massive list of useful payloads and bypasses for web application security. Includes XSS, SQL injection, SSRF, XXE, and many more attack vectors.

Payloads Bypasses 58k+ stars

Password Wordlists

CommonSpeak2

POPULAR

Compiled from BigQuery datasets containing most common English words and phrases. Great for password and subdomain enumeration.

BigQuery English

Weakpass

Collection of leaked passwords from various data breaches. Continuously updated with new breach data for comprehensive password testing.

Breach Data Updated

CrackStation

Massive 15GB wordlist containing every wordlist, dictionary, and password database leaked and published. Ultimate password cracking resource.

1.5B+ entries 15GB

DefaultCreds-cheat-sheet

Default credentials for various products, services, and IoT devices. Essential for testing default password vulnerabilities.

Default Creds IoT

Directory & File Discovery

RAFT Wordlists

POPULAR

Researched, Analyzed, Fuzzing and Tools wordlists. Optimized for web content discovery with small, medium, and large variants.

Multiple sizes Research-based

Web-Content Discovery

Collection from SecLists specifically for web content discovery. Includes common.txt, directory-list, and quickhits wordlists.

Web Paths Curated

Content Discovery All.txt

Comprehensive wordlist combining multiple directory brute-forcing lists. Perfect for thorough web application enumeration.

Combined Multi-source

API Endpoints

Specialized wordlists for API endpoint discovery. Contains common REST API paths, GraphQL queries, and API versioning patterns.

API Focused REST/GraphQL

Subdomain Enumeration

Subdomains Top 1M

POPULAR

Top 1 million most common subdomains compiled from internet scan data. Essential for subdomain brute-forcing and enumeration.

1M entries Top Results

Fierce DNS Wordlist

Classic DNS enumeration wordlist from the Fierce tool. Optimized for discovering subdomains through DNS brute-forcing.

DNS Classic

Bitquark Subdomains

Comprehensive subdomain wordlist from Bitquark Research. Contains over 500k+ subdomain names from real-world data.

500k+ entries Real Data

All.txt (Jhaddix)

Massive combined wordlist by Jason Haddix. Merges multiple subdomain sources into one comprehensive list for maximum coverage.

Bug Bounty Jhaddix

Fuzzing & Injection Payloads

Big List of Naughty Strings

POPULAR

Strings which have a high probability of causing issues when used as user-input data. Perfect for testing input validation and edge cases.

Edge Cases 13k+ stars

XSS Payload List

Comprehensive XSS (Cross-Site Scripting) payloads and bypass techniques. Includes polyglots, filters bypasses, and context-specific payloads.

XSS Bypasses

SQL Injection Payloads

Extensive SQL injection payloads for various database types. Includes authentication bypasses, time-based, error-based, and blind SQLi payloads.

SQLi Multi-DB

LFI/RFI Payloads

Local and Remote File Inclusion attack payloads. Includes path traversal, wrapper abuse, and filter bypass techniques.

LFI/RFI Traversal