Just "Harmless" Google dorks for bug hunters
☆22Nov 25, 2024Updated last year
Alternatives and similar repositories for G-dorks
Users that are interested in G-dorks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- To use hackJS, specify a target URL that contains JavaScript files you want to analyze. The tool will fetch these JavaScript files, extra…☆20Jun 19, 2025Updated 9 months ago
- Tool for PDB generation from IDA Pro database☆12Jul 27, 2020Updated 5 years ago
- ☆15Mar 21, 2025Updated last year
- Advanced mobile security research platform for authorized testing and educational purposes☆13Oct 4, 2025Updated 6 months ago
- URL Fuzzer☆20Nov 22, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆31Sep 9, 2025Updated 7 months ago
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- Small python script to extract Facebook deeplinks from an APK file☆14Oct 30, 2020Updated 5 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- ParamX is a tool designed to extract and categorize interesting subdomains and parameters from URLs.☆32Oct 7, 2025Updated 6 months ago
- e2e Scanning research module☆24Mar 26, 2026Updated 3 weeks ago
- HTTP Header Analysis Vulnerability Tool☆14May 6, 2022Updated 3 years ago
- ☆14May 20, 2019Updated 6 years ago
- Challenges for ImaginaryCTF 2025☆25Sep 7, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated 2 years ago
- Extract HP printer ".bdl" firmware update files☆12Nov 15, 2017Updated 8 years ago
- CVE-2025-3248 Langflow RCE Exploit☆17Jun 17, 2025Updated 9 months ago
- Use any program to perform fixups for afl via AFL_POST_LIBRARY☆11Aug 31, 2020Updated 5 years ago
- GitHub repository that analyzes Meta's binary transparency archives for security researchers☆23Oct 6, 2024Updated last year
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- A basic Bug Bounty target monitoring tool based on Discord Bot☆23Jan 30, 2025Updated last year
- ☆46Nov 19, 2025Updated 4 months ago
- your bestfried for finding LinkedIn Employees on github☆15Mar 28, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19Jul 9, 2021Updated 4 years ago
- ☆16Oct 3, 2018Updated 7 years ago
- Locally scan all the repositories of a github organization☆33Jul 20, 2025Updated 8 months ago
- Implementation for in-memory patching ida.dll and ida64.dll☆15May 8, 2020Updated 5 years ago
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆40Jul 28, 2025Updated 8 months ago
- DoS Attacks on Bluetooth Devices for pentest purposes☆33Nov 22, 2025Updated 4 months ago
- scrapy website Article and link ...☆15Dec 13, 2020Updated 5 years ago
- ☆17Jun 21, 2024Updated last year
- Nền tảng server nhỏ nhắn, dễ thương :*☆15Jul 31, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Grafana scanner with all public CVEs that I collected in one script to make grafana testing easier☆75Feb 15, 2026Updated 2 months ago
- Droz_scan is a automated script, that runs all the queries of drozer in a single run☆26May 15, 2023Updated 2 years ago
- Simple tools to handle string and generate subdomain permutations☆15Jun 8, 2022Updated 3 years ago
- ☆45Oct 28, 2021Updated 4 years ago
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆51Aug 9, 2025Updated 8 months ago
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- Proof of Concept UltraISO KeyGen☆12Jan 30, 2016Updated 10 years ago