Passive Vulnerability Auditor
☆136Jul 26, 2016Updated 9 years ago
Alternatives and similar repositories for doork
Users that are interested in doork are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- WebXploiter - An OWASP Top 10 Security scanner !☆92Feb 29, 2016Updated 10 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom valid…☆884Apr 9, 2021Updated 4 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Check UNIX/Linux systems for privilege escalation☆126Mar 31, 2016Updated 9 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- python script to bypass cloudflare from command line. built upon cfscrape module.☆19Sep 1, 2020Updated 5 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Jun 23, 2019Updated 6 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- Blaze Telegram Backdoor Toolkit is a post-exploitation tool that leverages the infrastructure of Telegram as a C&C☆206Sep 6, 2018Updated 7 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆343Aug 14, 2022Updated 3 years ago
- Neet - Network Enumeration and Exploitation Tool☆168Nov 30, 2016Updated 9 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- SpeedPhishing Framework☆450Aug 8, 2019Updated 6 years ago
- WebApp Information Gatherer☆550May 29, 2018Updated 7 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- Advanced Web Shell☆580May 1, 2017Updated 8 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- MassBleed SSL Vulnerability Scanner☆247Apr 18, 2020Updated 5 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- ☆77Jul 4, 2019Updated 6 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆347Dec 25, 2016Updated 9 years ago
- The Credential Mapper☆452Dec 1, 2017Updated 8 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆946May 28, 2021Updated 4 years ago
- Sniffles: Packet Capture Generator for IDS and Regular Expression Evaluation☆63Feb 25, 2021Updated 5 years ago
- Simple security surveillance script for linux distributions.☆59Jan 26, 2017Updated 9 years ago
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Apr 15, 2016Updated 9 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,349Nov 16, 2018Updated 7 years ago