anouarbensaad / findorks
☆7Updated 5 years ago
Alternatives and similar repositories for findorks:
Users that are interested in findorks are comparing it to the libraries listed below
- This tool is for detecting all what NMAP does if someone wants to hack you and expose the scanning from where by IP ADDRESS and the exact…☆35Updated 5 years ago
- This tool is virtual cisco_router to simulate telnet hacker connexion in Python which logs HackerIP and Command Lines☆16Updated 6 years ago
- Automate the setup envirements to the frontend , backend developpers using docker, ansible.☆7Updated 5 years ago
- ☆4Updated 5 years ago
- Management Of Breakdowns : a intranet project management of computer breakdowns in university with Ruby & Rails☆5Updated 6 years ago
- This tool to simulate http server attacks in Python which logs HackerIP and all the tracing he does into a Logfile then a database.☆70Updated 5 years ago
- A NodeJS wrapper for the Instagram Bot It works with instagram private api ,It has almost all the features the Instagram app.☆51Updated 2 years ago
- Share wifi on windows with arranged password like every hour or every day☆15Updated 8 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Fast subdomains enumeration tool for penetration testers☆11Updated 8 years ago
- Web-based Source Code Vulnerability Scanner☆21Updated 8 years ago
- Multi-threaded web application directory bruteforcer☆26Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆41Updated 2 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆35Updated 5 years ago
- Devploit v 1.1 Information Gathering Tool☆32Updated 7 years ago
- Automated Google dorking with custom search engines☆27Updated 4 years ago
- CERIO RCE CVE-2018-18852, authenticated (vendor defaults) web-based RCE as root user.☆46Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- My Payload Collection (XSS,SQL ...)☆14Updated 6 years ago
- A standalone addon for GnuPG☆18Updated 6 years ago
- ☆13Updated 5 years ago
- The great patator tool compiled for Windows☆26Updated 8 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- ☆66Updated 7 years ago
- ☆21Updated 6 years ago