An OSINT tool for searching DuckDuckGo via Tor using search dorks.
☆22May 3, 2025Updated 10 months ago
Alternatives and similar repositories for Tor-Dork-Search
Users that are interested in Tor-Dork-Search are comparing it to the libraries listed below
Sorting:
- ☆22Apr 28, 2025Updated 10 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- An automated Twitter bot that generates and posts engaging tweets about tech and learning experiences.☆17Mar 23, 2025Updated 11 months ago
- ☆12Aug 10, 2022Updated 3 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 8 months ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆30Feb 12, 2026Updated 2 weeks ago
- External recon toolkit☆54Dec 29, 2024Updated last year
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Mar 24, 2020Updated 5 years ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 7 months ago
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-sou…☆33Apr 14, 2025Updated 10 months ago
- ☆85May 15, 2025Updated 9 months ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆46Jun 1, 2025Updated 9 months ago
- HDLBits-Solutions☆10May 27, 2022Updated 3 years ago
- Unnoficial solutions (still under construction) to Nielsen and Chuang's "Quantum Computation and Quantum Information" - 10th anniversary …☆19Feb 11, 2026Updated 2 weeks ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- IDOR Scanner is a Burp Suite extension that automates the detection and enumeration of potentially vulnerable numeric fields to identify …☆43Feb 24, 2025Updated last year
- ☆145Jun 9, 2025Updated 8 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- pano date resolver stuff☆18Dec 3, 2025Updated 3 months ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆75Oct 2, 2025Updated 5 months ago
- Utility for making crosschain transactions on the Wanchain network☆13Mar 18, 2019Updated 6 years ago
- ☆13Mar 6, 2010Updated 15 years ago
- In accordance with survey reports, the growth of online business worldwide is significantly faster and higher in comparison with traditio…☆13Jul 30, 2023Updated 2 years ago
- CWE-1003 日本語訳☆10Feb 16, 2023Updated 3 years ago
- ☆13Apr 2, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago
- CANoolder: CAN to 3.3V logic level interface. Dumb. Cheap. Simple. Pick 3.☆15Feb 14, 2018Updated 8 years ago
- Mobile application and IoT network analysis automation tool.☆11May 9, 2019Updated 6 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Collection of projects for adding GNURadio to a REDHAWK Domain as a Component, thus enabling easy installation of flowgraphs into REDHAWK…☆14Jul 15, 2019Updated 6 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- IPAnalyzer is an IP Address Tracker OSINT ethical hacking tool built for Linux distributions, designed to gather detailed information abo…☆58Nov 19, 2025Updated 3 months ago