iamunixtz / LazyDorkLinks
Google Dorking tool
☆18Updated 9 months ago
Alternatives and similar repositories for LazyDork
Users that are interested in LazyDork are comparing it to the libraries listed below
Sorting:
- Aizawa is a command-line webshell designed to execute commands through HTTP header☆62Updated 6 months ago
- 51Pwn Platform,为黑客而生的大数据搜索引擎,Big data search engine born for hackers☆33Updated 10 months ago
- Ruijie-RG-EW1200G CVE-2023-4169_CVE-2023-3306_CVE-2023-4415☆26Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆29Updated 3 years ago
- WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass☆80Updated 2 years ago
- CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4☆150Updated last year
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆45Updated 5 months ago
- 🐱🏍红队小工具 | 自己编写的渗透中使用的各种脚本☆14Updated 2 years ago
- Unauthorized Docker Exploitation Tool☆37Updated last year
- pdf exploit 集成☆230Updated last year
- ParamWizard is a powerful Python-based tool designed for extracting and identifying URLs with parameters from a specified website. It pro…☆64Updated last year
- Domain Parser for IPAddress.com Reverse IP Lookup☆83Updated 2 years ago
- CVE-2023-25157 - GeoServer SQL Injection - PoC☆172Updated 2 years ago
- Automated penetration and auxiliary systems, providing XSS, XXE, DNS log, SSRF, RCE, web netcat and other Servers,gin-vue-admin,online ht…☆148Updated 3 months ago
- Hikvision log4j PoC☆64Updated 2 years ago
- The IoT security toolkit to help identify IoT related dashboards and scan them for default passwords and vulnerabilities.☆193Updated 9 months ago
- pdf-js-inject,能够将js代码注入到pdf文件中,也可以注入xss-payload到pdf文件中☆27Updated 11 months ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆99Updated last year
- D-Link NAS CVE-2024-3273 Exploit Tool☆104Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆16Updated last year
- BackdoorSim: An Educational into Remote Administration Tools☆106Updated last year
- A Linux persistence tool!☆155Updated last year
- Linux Incident Response Reporting☆85Updated last year
- cs手机版的源码,此处不放源jar包,自行添加编译☆54Updated 2 years ago
- jmreport/qurestSql 未授权SQL注入批量扫描poc Jeecg-Boot是一款基于Spring Boot和Jeecg-Boot-Plus的快速开发平台,最新的jeecg-boot 3.5.0 中被爆出多个SQL注入漏洞。☆21Updated 2 years ago
- PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2☆47Updated 9 months ago
- D3Ext's Forward Shell☆120Updated last year
- Automatic monitor github cve using Github Actions☆10Updated 8 months ago
- ☆28Updated last year
- subfinder-x是一款高性能的子域名爆破工具,使用 Go 语言开发,专为信息收集和渗透测试场景设计。该工具能够快速发现目标域名的子域名,并支持多级子域名扫描、HTTP服务识别和指纹识别等功能。☆28Updated 3 months ago