Searches and tests SQL dorks to find vulnerable sites.
☆10Oct 15, 2019Updated 6 years ago
Alternatives and similar repositories for dorkhunter
Users that are interested in dorkhunter are comparing it to the libraries listed below
Sorting:
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Oct 13, 2020Updated 5 years ago
- Bruteforce logins with python☆11Jul 12, 2022Updated 3 years ago
- InfiniteWP Client < 1.9.4.5 - Authentication Bypass☆21Jul 28, 2021Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- A small project I made for educational purposes, I wanted to see how small and fast I could make it.☆10Feb 13, 2021Updated 5 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Feb 21, 2023Updated 3 years ago
- WH-ApkCrypter 100% google play bypass☆13May 3, 2020Updated 5 years ago
- Analyze Android APK files from a browser.☆15Sep 29, 2020Updated 5 years ago
- ☆13May 20, 2019Updated 6 years ago
- ALL IN ONE Hacking Tool For Hackers☆15Jul 14, 2020Updated 5 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- SQLi Google Dork Scanner (new version)☆16Dec 7, 2021Updated 4 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆38Jul 28, 2022Updated 3 years ago
- WH-ApkCrypter-V2 100% bypass 2020☆42Oct 4, 2023Updated 2 years ago
- Hack Anyone's WiFi☆16Oct 2, 2023Updated 2 years ago
- THE MASS BEAST XTOOL FOR HACKING CPANEL | SHELL | MAILER | RDP | SSH | SMTP USING PYTHON☆26Jul 2, 2020Updated 5 years ago
- MIRAI botnet in python3☆20Jun 18, 2019Updated 6 years ago
- remote administrator framework☆22Aug 9, 2024Updated last year
- A tool to mass scan SQL Injection Vulnerable websites from a file.☆70Feb 2, 2017Updated 9 years ago
- WH-ApkCrypter any linux + android termux | 100% google play bypass☆26May 7, 2020Updated 5 years ago
- a personal leaks database to improve combolists and for more effective pentests☆25Sep 4, 2023Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Aug 4, 2020Updated 5 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆26Oct 1, 2020Updated 5 years ago
- Just an older botnet☆19Jun 12, 2020Updated 5 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆26Jun 29, 2017Updated 8 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- PPORise is a free, open-source and advanced bot for Pokémon Planet powered by Lua scripts.☆11Dec 8, 2022Updated 3 years ago
- İnstagram Clone.You can sign in, sign up, upload image, make comment 📷 Used ReactJS, Material UI, Firebase, Firestore Database☆22May 21, 2021Updated 4 years ago
- Cve and Exploit Finder on the target☆28May 8, 2022Updated 3 years ago
- Convert OpenBullet Configs to Standalone .exe Crackers - Completely Automated + Instant☆33Dec 23, 2020Updated 5 years ago
- multi Checkers (Hma/Hulu/Spotify/Call of duty/Instagram/smtp2go/VyprVpn) in One Tool Named FCommunity☆66Feb 21, 2023Updated 3 years ago
- MultiThreaded Application to Scrape Working Web Proxies☆34Sep 16, 2025Updated 5 months ago
- Pwndb request API☆24Jul 9, 2020Updated 5 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 7 years ago
- RainbowSQL is very fast dork&SQL injection scanner.☆61Jun 12, 2025Updated 8 months ago
- WEB SQLi Injection DB Dumper DATA Hacking Tool☆61Oct 1, 2019Updated 6 years ago
- Full Auto Exploit tool to SQL Injection: Admin Find -dork generation and grab from cx-Security and proxy cheaker and more :)☆30Feb 22, 2018Updated 8 years ago