SleepTheGod / Dorks
Google Dorking Payloads
☆10Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for Dorks
- ☆19Updated last year
- NetFuzzer is a comprehensive network security assessment tool for internal and external networks, including Firewalls, Routers, Switches,…☆13Updated 4 months ago
- ☆17Updated 4 months ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆20Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆37Updated 2 months ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆24Updated 2 months ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated 9 months ago
- ☆15Updated 11 months ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆14Updated 2 years ago
- Rockyou for web fuzzing☆14Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆48Updated 8 months ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated 11 months ago
- convert case style of words☆25Updated 10 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆35Updated last month
- Filter URLs to save your time.☆59Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆11Updated last year
- Bxss Sniper: A web application penetration testing tool for Blind XSS detection☆13Updated 11 months ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆26Updated last month
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- Automated HTTP Request Repeating With Burp Suite☆34Updated last year
- bash script for automating subdomain enumeration process either passive or active☆26Updated last year
- ☆13Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆23Updated last year
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆31Updated 11 months ago
- Simple recon tool automates your recon process☆16Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- This tool allows you to find ssti vulnerability with ease!☆19Updated 2 years ago