iamunixtz / LazyDork
Google Dorking tool
☆16Updated 5 months ago
Alternatives and similar repositories for LazyDork
Users that are interested in LazyDork are comparing it to the libraries listed below
Sorting:
- Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415☆26Updated last year
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆15Updated last year
- CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server☆38Updated 10 months ago
- CHAOS RAT web panel path RCE PoC☆28Updated last year
- xRay is a fairly powerful scanner that will allow you to scan and scout targets☆23Updated 2 years ago
- 51Pwn Platform,为黑客而生的大数据搜索引擎,Big data search engine born for hackers☆31Updated 7 months ago
- ParamWizard is a powerful Python-based tool designed for extracting and identifying URLs with parameters from a specified website. It pro…☆33Updated 8 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆75Updated 2 months ago
- Golang tool to help in forcing a license for HAK5 C2 Tool☆47Updated last year
- WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass☆80Updated last year
- CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit☆27Updated last month
- Unauthorized Docker Exploitation Tool☆36Updated last year
- PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2☆44Updated 6 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools tha…☆15Updated 6 years ago
- subfinder-x是一款高性能的子域名爆破工具, 使用 Go 语言开发,专为信息收集和渗透测试场景设计。该工具能够快速发现目标域名的子域名,并支持多级子域名扫描、HTTP服务识别和指纹识别等功能。☆14Updated this week
- Personally developed tools for buffer overflow attacks☆24Updated 2 years ago
- Aizawa is a command-line webshell designed to execute commands through HTTP header☆62Updated 2 months ago
- PoC for CVE-2024-42327 / ZBX-25623☆18Updated 5 months ago
- CVE-2024-27956 WordPress Automatic < 3.92.1 - Unauthenticated SQL Injection☆18Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆20Updated 8 months ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- ☆16Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information☆27Updated 9 months ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆58Updated last year
- hacking tools☆14Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆26Updated 2 years ago
- Domain Parser for IPAddress.com Reverse IP Lookup☆83Updated 2 years ago
- Insecure Android Application for testing Biometric bypasses☆12Updated 2 years ago
- Unauthenticated Command Injection In Progress Kemp LoadMaster☆17Updated last year