I use the http.txt file as a general first go to wordlist. I noticed over time and with some targets that it is highly likely to trigger a WAF and get the rest of your requests blocked. So I have moved most of the offending words into a secrets.txt file. |
||
|---|---|---|
| LICENSE | ||
| README.md | ||
| actions.txt | ||
| breakpoints.txt | ||
| burp-plugins.txt | ||
| dns.txt | ||
| graphql.txt | ||
| headers.txt | ||
| http.txt | ||
| javascript.txt | ||
| jwt.secrets.list | ||
| objects.txt | ||
| ports.txt | ||
| resolvers.txt | ||
| secrets.txt | ||
README.md
What
Wordlists I use for recon and content discovery on programs from hackerone and bugcrowd. These are only things I have actually encountered in production or in documentation of popular tooling. There is no point in having a huge wordlist but only ever getting 2 hits.