AssassinUKG / googleSearcherLinks
A custom Google search (to bypass some limitations on google and VPNs)
☆113Updated 2 years ago
Alternatives and similar repositories for googleSearcher
Users that are interested in googleSearcher are comparing it to the libraries listed below
Sorting:
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆68Updated last year
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- Dark-Shell is a Tool for Generating ReverShell File☆114Updated last month
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆46Updated 2 months ago
- 📲 Python project developed to help on the process of searching for vulnerabilities in Android mobile applications. It takes the APK file…☆136Updated 4 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- ProxyChecker Made in NodeJS☆38Updated 3 years ago
- an exploit of Server-side request forgery (SSRF)☆48Updated last year
- Automated OSINT on SwaggerHub☆179Updated last year
- Chrome extension tool for OSINT & Recon☆55Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆236Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆105Updated 2 years ago
- Origin IP scanning utility developed with ChatGPT☆68Updated 2 years ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆58Updated last year
- Gmail/GSuite account enumeration tool☆51Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- PassBreaker☆63Updated last year
- Bypass 403☆164Updated 7 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated 2 years ago
- Huge Collection of Wordpress Exploits and CVES☆124Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 9 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated last year
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆192Updated last month
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago
- simple recon tool to help you for searching vulnerability on web server☆73Updated 6 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year