Selenium powered Python script to automate searching for vulnerable web apps.
☆350Feb 20, 2022Updated 4 years ago
Alternatives and similar repositories for DorkNet
Users that are interested in DorkNet are comparing it to the libraries listed below
Sorting:
- Intelligence and Reconnaissance Package/Bundle installer.☆247Nov 11, 2020Updated 5 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆507Jul 28, 2021Updated 4 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- Command-line tool to scan Google search results for vulnerabilities☆544Feb 5, 2026Updated 3 weeks ago
- An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.☆272Apr 16, 2021Updated 4 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- Advanced reconnaissance utility☆994Nov 20, 2023Updated 2 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆450May 5, 2019Updated 6 years ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- An advanced multithreaded admin panel finder written in python.☆836May 17, 2024Updated last year
- A small python script to check for Cross-Site Tracing (XST)☆133Jan 23, 2016Updated 10 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,380May 22, 2020Updated 5 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- A ctypes powered python keylogger.☆107Nov 12, 2019Updated 6 years ago
- information gathering via dorks☆400Apr 19, 2022Updated 3 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆655Jan 6, 2022Updated 4 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,551Aug 10, 2024Updated last year
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- Pythonic ransomware proof of concept.☆219May 12, 2020Updated 5 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Know the dangers of credential reuse attacks.☆2,090Dec 9, 2025Updated 2 months ago
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- Automated Mass Exploiter☆5,211May 22, 2023Updated 2 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆306Oct 27, 2017Updated 8 years ago
- Tulpar - Web Vulnerability Scanner☆201Dec 8, 2019Updated 6 years ago
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Jun 24, 2018Updated 7 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆339Jul 31, 2024Updated last year
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Striker is an offensive information and vulnerability scanner.☆2,317Jun 4, 2023Updated 2 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Operational Security utility and automator.☆142Jul 21, 2020Updated 5 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago