An OSINT tool for searching DuckDuckGo via Tor using search dorks.
☆22May 3, 2025Updated 10 months ago
Alternatives and similar repositories for Tor-Dork-Search
Users that are interested in Tor-Dork-Search are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- ☆12Aug 10, 2022Updated 3 years ago
- External recon toolkit☆55Dec 29, 2024Updated last year
- This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypas…☆20May 4, 2025Updated 10 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆29Jun 13, 2025Updated 9 months ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated 10 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 8 months ago
- Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.☆12Feb 21, 2025Updated last year
- Rehashing APIs to prevent hash based detection☆14Jan 7, 2025Updated last year
- A simple CDR software for disarming malicious contents contained in documents.☆10Nov 7, 2022Updated 3 years ago
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆46Jun 1, 2025Updated 9 months ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 7 months ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 10 months ago
- A python-based vulnerability scanner designed to identify open redirect flaws in website applications.☆24Mar 15, 2026Updated last week
- ☆15Apr 17, 2025Updated 11 months ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆31Feb 12, 2026Updated last month
- Garudaastra Tool is based on python3 to find cameras around the world☆28Jun 29, 2023Updated 2 years ago
- A web application testing tool built for capturing and modifying http/https requests.☆16Oct 15, 2025Updated 5 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆95Aug 23, 2025Updated 7 months ago
- iban üzerinden bilgi toplamak için işlemi basitleştiren basit python kodu☆12Apr 6, 2023Updated 2 years ago
- ☆31Aug 13, 2025Updated 7 months ago
- This repository is a place to leave and share notes on Hak5 scripts - credit to the many authors for sharing great content.☆14Nov 27, 2021Updated 4 years ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Mar 24, 2020Updated 6 years ago
- ☆147Jun 9, 2025Updated 9 months ago
- AI model safety scanner built on NVIDIA garak☆217Updated this week
- ZenScraper is an asynchronous scraper built with Python and Playwright designed for efficiently retrieving tweets from X.com (formerly Tw…☆15May 9, 2025Updated 10 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆423Feb 13, 2026Updated last month
- A powerful Burp Suite extension that imports Postman collections☆31Aug 1, 2025Updated 7 months ago
- ☆197Apr 23, 2025Updated 11 months ago
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 9 months ago
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆51Jan 16, 2026Updated 2 months ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 9 months ago
- A web based checklist driven note taking app following bug bounty and web app pentest methodology.☆40Jun 17, 2025Updated 9 months ago
- A curated list of bookmarks, packages, tutorials, videos and other cool resources from the Laravel ecosystem. With repository stars⭐ and …☆26Updated this week
- ☆27Mar 6, 2025Updated last year
- The New Hacking Framework☆18Apr 26, 2017Updated 8 years ago