> cat /dev/github | grep security-tools
discovered 30 Mar 2026

leaky-paths

★ 1029 via github-topic
→ View on GitHub

AI Summary: Leaky Paths is a curated repository of high-quality wordlists designed for web content discovery, targeting misconfigurations and sensitive API endpoints in major web frameworks and infrastructure projects. It serves as a rapid assessment tool for pentesters, security engineers, and bug bounty hunters, emphasizing modern tech stack paths that yield valuable insights while intentionally maintaining a concise list for optimal efficiency. Notable features include paths associated with known vulnerabilities and endpoints that typically expose sensitive data, facilitating quick identification of potential security issues.


README

About

A collection of special paths linked to major web frameworks and infrastructure projects, known juicy APIs, misconfigurations.. etc. These could be used for web-content discovery as the fastest way to find quick wins.

Goal

With the goal of providing the community with high-quality wordlists, I opened up this repository for contributions from anyone. This should be your go-to for quick hits on any targets, whether you’re a Pentester using it for assessments, a security engineer using it as part of your external attack surface scanning, or a bug bounty hunter scanning a large number of subdomains/hosts for quick wins using high-quality wordlists. It contains:

  • PATHS associated with known misconfigurations, endpoints leaking sensitive data, granting access to some special parts of the app, etc.

  • Paths that typically expose API endpoints or server data. Perfect for finding more “hidden” APIs, interesting and verbose endpoints.

  • The direction this wordlist is taking is shifting away from CVEs, and focusing mostly on infrastructure and web-related paths from modern tech stacks, which often yield better returns.

Contribution

You are welcome to create a new pull request if you have a new endpoint to include or simply any unique paths that typically return juicy information.

Please keep in mind that the wordlist is intentionally kept short in order to focus only on high-quality endpoints, so it is not comprehensive enough for active scanning.

Please see Assetnote and SecLists for extended and large wordlists