indiancybertroops / DorKey
Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator
☆15Updated 3 years ago
Alternatives and similar repositories for DorKey:
Users that are interested in DorKey are comparing it to the libraries listed below
- This tool is used to find the admin login page of a website.☆16Updated 4 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆9Updated last year
- An OSINT tool to search for accounts by username in social networks.☆17Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆12Updated 2 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆16Updated 5 months ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago
- Multi-client Cross-platform Python Backdoor/Reverse Shell/RAT with AES Encryption☆7Updated 2 years ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆36Updated 4 months ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆39Updated 7 months ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- A small tool to find admin panel of the website☆14Updated 2 years ago
- FrameDomain Framework - subdomains enumeration tool for penetration testers☆31Updated 4 years ago
- xdebug 2.5.5 RCE exploit☆30Updated 3 months ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- Cracking protocols FTP and SSH.☆11Updated 8 months ago
- Reverse And Dorking Tools☆25Updated 3 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆39Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- that is a very sophisticated deface tool☆10Updated 2 years ago
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆23Updated last year
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆33Updated 6 years ago
- A Simple Script For SSH BruteForce☆36Updated last year
- Informatrion Gathering Framework☆21Updated 2 years ago