Selenium powered Python script to automate searching for vulnerable web apps.
☆347Feb 20, 2022Updated 4 years ago
Alternatives and similar repositories for DorkNet
Users that are interested in DorkNet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intelligence and Reconnaissance Package/Bundle installer.☆251Nov 11, 2020Updated 5 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Feb 12, 2019Updated 7 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆506Jul 28, 2021Updated 4 years ago
- Command-line tool to scan Google search results for vulnerabilities☆542Mar 31, 2026Updated 3 weeks ago
- An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.☆270Apr 16, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Automated Mass Exploiter☆5,229May 22, 2023Updated 2 years ago
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- A ctypes powered python keylogger.☆107Nov 12, 2019Updated 6 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- Advanced reconnaissance utility☆994Nov 20, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,462Nov 3, 2018Updated 7 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆133May 27, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- information gathering via dorks☆401Apr 19, 2022Updated 4 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,561Aug 10, 2024Updated last year
- A friend of SQLmap which will do what you always expected from SQLmap.☆451May 5, 2019Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 4 months ago
- Email recon made fast and easy, with a framework to build on☆955Jan 12, 2023Updated 3 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆90May 8, 2018Updated 7 years ago
- Pythonic ransomware proof of concept.☆219May 12, 2020Updated 5 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Jan 23, 2016Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- WebApp Information Gatherer☆551May 29, 2018Updated 7 years ago
- Tulpar - Web Vulnerability Scanner☆200Dec 8, 2019Updated 6 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- A tool to help you manage your leaks☆35Nov 22, 2017Updated 8 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- An advanced multithreaded admin panel finder written in python.☆839May 17, 2024Updated last year
- Find exploits in local and online databases instantly☆1,808Sep 27, 2021Updated 4 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆659Jan 6, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,766Dec 9, 2025Updated 4 months ago
- Striker is an offensive information and vulnerability scanner.☆2,331Jun 4, 2023Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆339Jul 31, 2024Updated last year
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆310Oct 27, 2017Updated 8 years ago