AhmedOsamaMath / sqli-dorks-generator
Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search parameters to generate comprehensive dork lists for security research.
☆38Updated 5 months ago
Alternatives and similar repositories for sqli-dorks-generator:
Users that are interested in sqli-dorks-generator are comparing it to the libraries listed below
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- An OSINT focused tool made with Nodejs!☆92Updated 2 years ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆46Updated last year
- DorkScraper is a simple tool written in Python to extract all the urls that appear when using a Google Dork.☆54Updated 9 months ago
- Hacking with PasteJacking technique☆22Updated 10 months ago
- Hackerinfo infromations Web Application Security☆71Updated last year
- 27 ways to bypass 2FA/otp☆42Updated last year
- A simple tool to check if an email is associated with an Instagram account. Useful for OSINT and verifying account existence. 🕵️♂️✨☆19Updated 6 months ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆41Updated last year
- Ultimate Google Dork Lists OSWP top 10☆56Updated 9 months ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- Bruteforce tool / cracker for MD5 hashes. Processing single hashes, lists and combolists (userid:md5hash).☆36Updated 4 years ago
- Information Gathering Simplified.☆65Updated 2 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆66Updated last year
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆44Updated 11 months ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆39Updated 8 months ago
- A tool for automatically change the Tor IP address over time.☆81Updated last month
- Tool for automate bug hunting process 🔍 --> 🍭☆40Updated 9 months ago
- Updated 6000 Sql Injection Google Dork 2021☆37Updated 3 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆72Updated last year
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆23Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆32Updated last year
- Cracking protocols FTP and SSH.☆11Updated 9 months ago
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆38Updated 6 months ago
- A bash and powershell script to download the latest version of Burp-Suite Professional and use it for free.☆17Updated 2 years ago
- Clipboard poisoning attack.☆56Updated 4 years ago
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆40Updated 3 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year
- Drishti is an information collection tool (OSINT) which aims to carry out Basic Information.☆51Updated 3 years ago