Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator
☆16Mar 13, 2022Updated 3 years ago
Alternatives and similar repositories for DorKey
Users that are interested in DorKey are comparing it to the libraries listed below
Sorting:
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- SQLi Google Dork Scanner (new version)☆16Dec 7, 2021Updated 4 years ago
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- Trinetra is Web Crawling Tool For Bug Bounty And Web Pentesters It will Help To Spider Url's From Web And It will Gain Url Info From Web…☆10Nov 29, 2021Updated 4 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 10 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- Auto exploiter + Dumper, steal information on victim site, and auto create mailer on victim☆10Jan 6, 2019Updated 7 years ago
- A python tool to test for web cache poisoning denial of service (CPDoS) vulnerabilities.☆15Oct 19, 2023Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Official Website Of The Sigma Project☆21Feb 16, 2026Updated last week
- Havoc plugin allowing in-memory execution of PowerShell cmdlets☆13Dec 14, 2023Updated 2 years ago
- Automated enumeration for red teamers☆10Nov 22, 2022Updated 3 years ago
- This tool is used to find the admin login page of a website.☆16Jan 15, 2021Updated 5 years ago
- BruteDum - Brute Force attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack☆57Apr 30, 2019Updated 6 years ago
- A simple BOF (Beacon Object File) to search files in the system☆15Dec 2, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information☆34Jul 19, 2024Updated last year
- A Keylogger Made in Python. Tested on Windows, Linux. windows and linux executable payload generator. Screen shot and custom time delay. …☆16Sep 18, 2022Updated 3 years ago
- Handy Collection of Google Dorks for Bug Bounty Hunting and Penetration Testing.☆21Feb 22, 2026Updated last week
- N0aziXss Origin Recon 🍓☆23Dec 16, 2025Updated 2 months ago
- exploit code for F5-Big-IP (CVE-2020-5902)☆43May 22, 2023Updated 2 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that ru…☆18Jan 15, 2019Updated 7 years ago
- Bypassing File Upload Restriction using Magic Bytes☆22Jul 4, 2022Updated 3 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆20May 23, 2022Updated 3 years ago
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆43Nov 5, 2023Updated 2 years ago
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- AutoExploiter Wordpress , Joomla , Drupal☆18Mar 27, 2018Updated 7 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Jun 20, 2022Updated 3 years ago
- my personal website☆22Feb 20, 2026Updated last week
- Wordlist creator written in C to generate all possibilities of passwords☆25Jun 16, 2018Updated 7 years ago
- Tutorial Seputar Depes Dan Web Hacking☆36Jun 26, 2022Updated 3 years ago
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- Automated pshtt, trustymail, and sslyze scanning☆30Feb 18, 2026Updated last week
- A lightweight Roblox Account Manager written fully in Python.☆25Updated this week
- Generate Professional Phishing Emails Fast And Easy☆25Jul 19, 2021Updated 4 years ago
- Hacking made easy for everyone By improving user experience and usability of every tool. For Hackers By Hacker/Programmer Best tool you w…☆33Feb 8, 2025Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆28Mar 26, 2023Updated 2 years ago
- It is the best proxy checker, super fast!☆31Nov 16, 2025Updated 3 months ago
- CVE-2024-32640 | Automated SQLi Exploitation PoC☆77May 16, 2024Updated last year