Skip to content

Latest commit

 

History

History
129 lines (90 loc) · 3.78 KB

File metadata and controls

129 lines (90 loc) · 3.78 KB

1 Repo For Everything !!!

Access list is a collection of multiple types of lists used during pentesting, collected in one place, created by Undercode

Access List

This list include a collections of Tools, Combos, wordlists shells, exploits and Vulnerabilities and may more…


Install

As Zip

wget -c https://github.com/undercodeutilities/Accesslist/archive/main.zip -O Accesslist.zip \
  && unzip Access.zip \
  && rm -f Access.zip

Git

git clone https://github.com/undercodeutilities/Accesslist.git

Licensing

This project is licensed under the MIT license.

MIT License


GitHub badge

graph TD
    ROOT["ACCESSLIST"] --> AI
    AI --> AI_JAILBREAK["ai_jailbreak"]
    AI --> simulation["simulation"]
    AI_JAILBREAK --> AI_CHATGPT["chatgpt"]
    AI_JAILBREAK --> AI_DEEPSEEK["DeepSeek"]

    ROOT --> BUGBOUNTY["bugbounty"]
    BUGBOUNTY --> BB_AUTO["Automation Process Using CSV"]
    BUGBOUNTY --> BB_IDOR["IDOR"]
    BUGBOUNTY --> BB_IOS["ios"]
    BB_IOS --> BB_IOS_BT["bluetooth"]
    BUGBOUNTY --> BB_POC["POC"]

    ROOT --> COMBOS["Combos"]
    ROOT --> DEFAULT["default"]
    DEFAULT --> DEFAULT_LOGIN["login"]

    ROOT --> DORKS["dorks"]
    ROOT --> FLAW["Flaw"]
    FLAW --> FLAW_UNION["UnionPay android security payment vulnerabilities"]
    FLAW --> FLAW_WIN["Windows"]

    ROOT --> FORENSIC["forensic"]
    FORENSIC --> FORENSIC_IMG["image"]

    ROOT --> FUZZING["Fuzzing"]
    ROOT --> PASSWORDS["Passwords"]

    ROOT --> SHELLS["Shells"]
    SHELLS --> SHELLS_LINUX["Linux"]
    SHELLS_LINUX --> SHELLS_LINUX_CVE["CVE_2025_22035"]
    SHELLS --> SHELLS_MAC["Macos"]
    SHELLS --> SHELLS_WIN["Windows"]

    ROOT --> STEG["steganography"]
    ROOT --> UNAUTH["Unauthorized"]

    ROOT --> VULNS["Vulnerabilities"]
    VULNS --> VULNS_CVE1["CVE_2024_7414_video"]
    VULNS --> VULNS_CVE2["CVE_2025_0411_7_zip"]
    VULNS --> VULNS_CVE3["CVE_2025_22035"]
    VULNS --> VULNS_MAG["Magneto"]
    VULNS --> VULNS_WP["Wordpress"]

    ROOT --> WORDLISTS["wordlists_tb"]
    WORDLISTS --> WORDLISTS_WEB["forweb"]
Loading

Donations

If you find this project useful, consider buying me a coffee to show your support and help us share more valuable content. ☕💖

Buy Me a Coffee


Join Us

Join Our Cyber Groups:

WhatsApp Telegram


Videos

AI Prompt - Permanent


More

Official Website

CVE Updates & Database

Cyber & Tech News

Hackers Monitor & Tutorials