AhmedOsamaMath / sqli-dorks-generator
Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search parameters to generate comprehensive dork lists for security research.
☆36Updated 4 months ago
Alternatives and similar repositories for sqli-dorks-generator:
Users that are interested in sqli-dorks-generator are comparing it to the libraries listed below
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- A tool for automatically change the Tor IP address over time.☆79Updated 2 weeks ago
- Ultimate Google Dork Lists OSWP top 10☆55Updated 8 months ago
- Tool for automate bug hunting process 🔍 --> 🍭☆39Updated 8 months ago
- Valhalla finds vulnerable devices on shodan, it can also scan a list of domains to find vulnerabilities.☆45Updated last year
- Automatic tool to find Google Dorks☆34Updated 6 months ago
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated 9 months ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆39Updated last year
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- An OSINT focused tool made with Nodejs!☆92Updated 2 years ago
- DorkScraper is a simple tool written in Python to extract all the urls that appear when using a Google Dork.☆53Updated 9 months ago
- Findigo is small tool to information gathering phonenumbers.☆59Updated 2 years ago
- Drishti is an information collection tool (OSINT) which aims to carry out Basic Information.☆50Updated 3 years ago
- Information Gathering Simplified.☆64Updated 2 years ago
- 27 ways to bypass 2FA/otp☆42Updated last year
- PassBreaker☆60Updated last year
- This script will install all the essential bug bounty tools and will find some basic vulns. I made this script for my daily hunting. The …☆40Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆39Updated 7 months ago
- Boost website hits by generating requests from multiple proxy IPs.☆64Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- 🕵️ Track down social media profiles using a specific username across multiple social network platforms☆44Updated 10 months ago
- Hacking with PasteJacking technique☆22Updated 9 months ago
- Updated 6000 Sql Injection Google Dork 2021☆36Updated 3 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆68Updated last year
- This tool is used to find the admin login page of a website.☆16Updated 4 years ago
- Tool for bypassing logins vulnerable against SQL injection☆45Updated last year
- Bruteforce tool / cracker for MD5 hashes. Processing single hashes, lists and combolists (userid:md5hash).☆36Updated 4 years ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆63Updated 11 months ago
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆66Updated 7 months ago
- Bug Bounty ultimate tool☆19Updated 5 months ago