anouarbensaad / findorks
☆7Updated 4 years ago
Alternatives and similar repositories for findorks:
Users that are interested in findorks are comparing it to the libraries listed below
- This tool is for detecting all what NMAP does if someone wants to hack you and expose the scanning from where by IP ADDRESS and the exact…☆34Updated 5 years ago
- This tool is virtual cisco_router to simulate telnet hacker connexion in Python which logs HackerIP and Command Lines☆15Updated 6 years ago
- Automate the setup envirements to the frontend , backend developpers using docker, ansible.☆7Updated 5 years ago
- ☆4Updated 5 years ago
- Management Of Breakdowns : a intranet project management of computer breakdowns in university with Ruby & Rails☆4Updated 6 years ago
- This tool to simulate http server attacks in Python which logs HackerIP and all the tracing he does into a Logfile then a database.☆69Updated 5 years ago
- A NodeJS wrapper for the Instagram Bot It works with instagram private api ,It has almost all the features the Instagram app.☆51Updated 2 years ago
- Fast subdomains enumeration tool for penetration testers☆11Updated 8 years ago
- An unofficial Humax IR4000HD terminal client with enhanced features.☆9Updated 5 years ago
- Share wifi on windows with arranged password like every hour or every day☆15Updated 7 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆28Updated 4 years ago
- Site Admin Page Finder with Python Script | Edited By Sir.4m1R☆18Updated 7 years ago
- Auxile Framework☆28Updated 4 years ago
- 🏗 DZGEN - Works with Kali Linux tools☆125Updated 6 years ago
- ☆13Updated 2 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- ☆109Updated last year
- Search for leaked creadentials on pwndb using the command line and tor.☆23Updated 6 years ago
- 🕵️ exploit3r - Joomla Auto Config Donwload☆47Updated 6 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆32Updated 5 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆36Updated 5 years ago
- 💀 Subdomain - Searching Subdomain Of the site☆32Updated 6 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Random scripts I write to automate non-hacking stuff☆21Updated 5 years ago
- Simple Webshell Scanner☆50Updated 10 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995☆108Updated 6 years ago
- pentest toolbox☆28Updated 2 years ago
- Multi-threaded web application directory bruteforcer☆25Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago