GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.
☆273Dec 23, 2024Updated last year
Alternatives and similar repositories for GoogleDorker
Users that are interested in GoogleDorker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆125Dec 17, 2024Updated last year
- SpideyX a multipurpose Web Penetration Testing tool with asynchronous concurrent performance with multiple mode and configurations.☆191Mar 18, 2025Updated last year
- Khonsu is a powerful port scanning tool written in python that detect open ports with concurrent and accurately☆16Oct 8, 2025Updated 5 months ago
- ☆20Jul 23, 2025Updated 8 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆740Jan 25, 2026Updated 2 months ago
- Subprober is a powerful and efficient subdomain scanning tool written in Python. With the ability to handle large lists of subdomains. Th…☆265Jul 6, 2025Updated 8 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆63Feb 22, 2025Updated last year
- CrlfiX☆21Jan 30, 2025Updated last year
- masscan with exclusive excludes☆58Nov 8, 2023Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆61Nov 22, 2024Updated last year
- ParamScan is a chrome extension for finding reflected parameters in a webpage.☆92Jan 11, 2025Updated last year
- dnsprober is a fast and multipurpose DNS reconnaissance tool designed for efficient DNS probing and enumeration. It supports multiple DNS…☆36Jun 23, 2025Updated 9 months ago
- ShodanX is a tool to gather information of targets using shodan dorks⚡.☆554May 14, 2025Updated 10 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- An insane list of all dorks taken from everywhere from various different sources.☆784Dec 29, 2025Updated 2 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Robofinder retrieves historical #robots.txt files from #Archive.org, allowing you to collect old directories and paths for any domain whi…☆236Nov 21, 2025Updated 4 months ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Nov 5, 2023Updated 2 years ago
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆227Aug 25, 2025Updated 6 months ago
- Url scrapper or extractor from alienvault☆38Mar 1, 2025Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.☆853Jan 5, 2026Updated 2 months ago
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Nov 26, 2024Updated last year
- ☆483Aug 21, 2025Updated 7 months ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- ☆40Jul 28, 2024Updated last year
- jshunter is a command-line tool designed for analyzing JavaScript files and extracting endpoints. This tool specializes in identifying se…☆497Jan 22, 2026Updated 2 months ago
- GoogleDorks Toolkit is a powerful automated tool for google dorks, designed for pentration tester, ethical hackers and bug hunters to det…☆63Mar 15, 2025Updated last year
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- Automation tool to testing and confirm the xss vulnerability.☆306Jul 18, 2025Updated 8 months ago
- ☆13Mar 6, 2025Updated last year
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆44Sep 22, 2024Updated last year
- Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers☆312Mar 31, 2024Updated last year
- High-Performance JavaScript Security Scanner - Process 1M URLs in ~5 hours with Telegram & Discord bot integration, Docker support, and c…☆171Oct 18, 2025Updated 5 months ago
- A modern tool written in Python that automates your xss findings.☆470Nov 26, 2023Updated 2 years ago
- SubOwner - A Simple tool check for subdomain takeovers.☆116Oct 18, 2024Updated last year
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆204May 22, 2025Updated 10 months ago