indiancybertroops / DorKeyLinks
Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator
☆15Updated 3 years ago
Alternatives and similar repositories for DorKey
Users that are interested in DorKey are comparing it to the libraries listed below
Sorting:
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- This tool is used to find the admin login page of a website.☆16Updated 4 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆9Updated last year
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆20Updated last year
- Multi-client Cross-platform Python Backdoor/Reverse Shell/RAT with AES Encryption☆7Updated 2 years ago
- A small tool to find admin panel of the website☆14Updated 2 years ago
- An OSINT tool to search for accounts by username in social networks.☆17Updated 2 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆41Updated 6 months ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆16Updated 7 months ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆13Updated 3 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆22Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆42Updated 2 years ago
- crawl a website for links and expose all the vulnerable parameters.☆13Updated 2 years ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- ☆17Updated 3 years ago
- This tool can generate various types of dropper to hide your main payload☆7Updated 2 years ago
- Cracking protocols FTP and SSH.☆12Updated 10 months ago
- Trinetra is Web Crawling Tool For Bug Bounty And Web Pentesters It will Help To Spider Url's From Web And It will Gain Url Info From Web…☆9Updated 3 years ago
- Dogma V1.5.3☆29Updated 5 years ago
- B-UAC, Windows UAC Bypass Trojan Generator☆8Updated 6 years ago
- Reverse And Dorking Tools☆25Updated 4 years ago
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆20Updated 3 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆21Updated last year
- A very user friendly and advanced phishing toolkit made for hackers☆29Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 9 months ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year