Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google search queries to help you find data and vulnerabilities more easily. Perfect for anyone interested in cybersecurity, it makes searching more effective and efficient.
☆19Aug 10, 2025Updated 7 months ago
Alternatives and similar repositories for Elite-Google-Dorks-Search-by-Biscuit
Users that are interested in Elite-Google-Dorks-Search-by-Biscuit are comparing it to the libraries listed below
Sorting:
- Links for resources☆12Jun 10, 2023Updated 2 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- A tool which helps identifying client-side prototype polluting libraries☆39May 1, 2025Updated 10 months ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Documenting all the sources from where I'm learning Mobile(adnroid/IOS) bug bounty so if another researcher want to start with mobile bug…☆25Aug 13, 2025Updated 6 months ago
- Attempt to grind out the 100 offsec project challenges, conceptualized by github user, @kurogai, at his repo [https://github.com/kurogai/…☆16Jul 16, 2024Updated last year
- Various scripts & tools☆12Apr 22, 2024Updated last year
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- Fast scanner for exposed env files☆14Nov 14, 2022Updated 3 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- u-blox Linux Kernel repository☆12Jan 29, 2016Updated 10 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Shellcode loader with evasion capabilities written in Nim☆15Jan 25, 2025Updated last year
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- A simple Impacket-based tool to check a set of credentials against many Windows hosts and get permission for SMB shares.☆13Dec 26, 2025Updated 2 months ago
- Simple application that creates a JS8Call ready string to send to the APRS network.☆14Jun 10, 2021Updated 4 years ago
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Collection of F-Droid repositories☆17Nov 23, 2023Updated 2 years ago
- A simple trap for web crawlers☆12Aug 2, 2023Updated 2 years ago
- ☆11Jun 19, 2024Updated last year
- Parameter-Reflect-Finder is a python based tool that helps you find reflected parameters which can have potential XSS or Open redirection…☆16Aug 8, 2022Updated 3 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- ☆11Nov 26, 2025Updated 3 months ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- Scrippy is a browser extension that holds sql statements (think clip board) to aid devlopers in the testing of websites for basic code in…☆12Aug 21, 2022Updated 3 years ago
- Selenium examples for Serenity and BrowserStack Automate☆12Jan 26, 2026Updated last month
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆13Aug 7, 2016Updated 9 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated 11 months ago
- KERnano: The No-install Python Pen Testing kit. (Windows & Linux)☆13Sep 2, 2022Updated 3 years ago
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- Single hashcat rule file containing all possible rules.☆10Oct 20, 2015Updated 10 years ago
- API Routing Gateway with micro-payment verification☆11Mar 31, 2021Updated 4 years ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆12Feb 19, 2022Updated 4 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Mar 24, 2023Updated 2 years ago