AhmedOsamaMath / sqli-dorks-generatorLinks
Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search parameters to generate comprehensive dork lists for security research.
☆39Updated 5 months ago
Alternatives and similar repositories for sqli-dorks-generator
Users that are interested in sqli-dorks-generator are comparing it to the libraries listed below
Sorting:
- DorkScraper is a simple tool written in Python to extract all the urls that appear when using a Google Dork.☆55Updated 10 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- An OSINT focused tool made with Nodejs!☆93Updated 2 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆36Updated last year
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆41Updated 3 years ago
- Ultimate Google Dork Lists OSWP top 10☆56Updated 9 months ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆42Updated last year
- Updated 6000 Sql Injection Google Dork 2021☆38Updated 3 years ago
- Tool for automate bug hunting process 🔍 --> 🍭☆41Updated 9 months ago
- Information Gathering Simplified.☆67Updated 2 years ago
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆116Updated 2 years ago
- 27 ways to bypass 2FA/otp☆42Updated last year
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated 8 months ago
- A tool for automatically change the Tor IP address over time.☆87Updated last month
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆75Updated last year
- Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited☆18Updated 9 months ago
- Boost website hits by generating requests from multiple proxy IPs.☆67Updated last year
- Automatic tool to find Google Dorks☆35Updated 7 months ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆45Updated 9 months ago
- Osint tool to scraper websites☆63Updated last year
- It is a reverseip tool. Grab only main Domains. Fast and own priv8 API☆40Updated last year
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆20Updated last week
- A simple tool to check if an email is associated with an Instagram account. Useful for OSINT and verifying account existence. 🕵️♂️✨☆19Updated 7 months ago
- This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to 36 common web applicatio…☆23Updated last month
- This tool will help you find a close friend☆66Updated last year
- Bug Bounty ultimate tool☆20Updated 6 months ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14Updated 2 years ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆106Updated 3 weeks ago