Selenium powered Python script to automate searching for vulnerable web apps.
☆350Feb 20, 2022Updated 4 years ago
Alternatives and similar repositories for DorkNet
Users that are interested in DorkNet are comparing it to the libraries listed below
Sorting:
- Intelligence and Reconnaissance Package/Bundle installer.☆248Nov 11, 2020Updated 5 years ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆118Feb 12, 2019Updated 7 years ago
- A Bash script that downloads and unzips scripts that will aid with privilege escalation on a Linux system.☆506Jul 28, 2021Updated 4 years ago
- Command-line tool to scan Google search results for vulnerabilities☆544Mar 12, 2026Updated last week
- An automatic SQL Injection tool which takes advantage of ~DorkNet~ Googler, Ddgr, WhatWaf and sqlmap.☆272Apr 16, 2021Updated 4 years ago
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- Automated Mass Exploiter☆5,217May 22, 2023Updated 2 years ago
- Shodan.io Command Line Interface☆43Jul 10, 2021Updated 4 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- A ctypes powered python keylogger.☆107Nov 12, 2019Updated 6 years ago
- Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers.☆81Aug 28, 2017Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,450Nov 3, 2018Updated 7 years ago
- Advanced reconnaissance utility☆995Nov 20, 2023Updated 2 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- information gathering via dorks☆400Apr 19, 2022Updated 3 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,558Aug 10, 2024Updated last year
- A friend of SQLmap which will do what you always expected from SQLmap.☆450May 5, 2019Updated 6 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 3 months ago
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Jan 23, 2016Updated 10 years ago
- Pythonic ransomware proof of concept.☆219May 12, 2020Updated 5 years ago
- WebApp Information Gatherer☆550May 29, 2018Updated 7 years ago
- Tulpar - Web Vulnerability Scanner☆200Dec 8, 2019Updated 6 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- A tool to help you manage your leaks☆34Nov 22, 2017Updated 8 years ago
- An advanced multithreaded admin panel finder written in python.☆838May 17, 2024Updated last year
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆656Jan 6, 2022Updated 4 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,763Dec 9, 2025Updated 3 months ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Striker is an offensive information and vulnerability scanner.☆2,322Jun 4, 2023Updated 2 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆339Jul 31, 2024Updated last year
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆307Oct 27, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago