AeonDave / doork
Passive Vulnerability Auditor
☆128Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for doork
- Tools for harvesting email addresses for phishing attacks |☆84Updated 9 years ago
- ☆191Updated 6 years ago
- Useful pentesting scripts☆83Updated 7 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆185Updated 5 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆162Updated 5 years ago
- Vulnerability scanner based on vulners.com audit API☆65Updated 6 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆144Updated 8 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆94Updated last year
- Poison, reset, spoof, redirect MITM script☆124Updated last year
- Tool to automatic leak information using Hacking with engine searches☆92Updated 6 years ago
- SpiderLabs shared Nmap Tools☆227Updated 4 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆144Updated 7 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago
- Search exploits in multiple exploit databases!☆80Updated 4 years ago
- Automated digital reconnaissance☆193Updated last year
- search for hosts info with shodan☆228Updated 3 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆103Updated 7 years ago
- Orb is a massive footprinting tool.☆45Updated 4 years ago
- Shodan HQ nmap plugin - passively scan targets☆152Updated 8 years ago
- myBFF - a Brute Force Framework☆138Updated 11 months ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆120Updated 5 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆114Updated 5 years ago
- AutoBrowser Screenshot☆48Updated 8 years ago
- WebXploiter - An OWASP Top 10 Security scanner !☆75Updated 8 years ago
- Script to generate malicious debian packages (debain trojans).☆117Updated 5 years ago