A personal collection of wordlists curated from real bug bounty experiences for discovering hidden directories, paths, endpoints, and subdomains during authorized security testing.
How It Works
You learn about a helpful list of common hiding spots on websites from fellow security testers sharing their favorites.
You go to the shared page to see what's offered and read stories of how it helped find real secrets.
You download the main list, feeling excited to try this proven collection in your own authorized tests.
You pick a website where you have full permission to explore, keeping everything legal and responsible.
You use the list to scan the site, uncovering paths and spots that others might miss—it's like having a treasure map!
You find interesting endpoints and patterns that lead to potential weak spots on the site.
Your tests contribute to safer websites, and you celebrate landing valuable findings just like the creator did.
Star Growth
Repurpose is a Pro feature
Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.
Unlock RepurposeSimilar repos coming soon.