ivan-sincek / chadLinks
Search Google Dorks like Chad. / Broken link hijacking tool.
☆30Updated last month
Alternatives and similar repositories for chad
Users that are interested in chad are comparing it to the libraries listed below
Sorting:
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last month
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- Enumeration & fingerprint tool☆25Updated last year
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆29Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆50Updated 5 months ago
- A Network Automation framework focused on Cyber-Security☆47Updated 2 years ago
- 「🚪」The hidden hookless backdoor☆13Updated 7 months ago
- PHP lab to test captcha bypassing☆31Updated last year
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆49Updated 5 months ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆15Updated last year
- my mini collection of exploits and scripts for pentest☆12Updated 2 years ago
- Ransomware for demonstration☆17Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- 🧬 Extract and analyze contributors info from git repos☆82Updated last year
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 7 months ago
- Brute force a REST API query through WebSocket. Based on cURL.☆9Updated 2 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆8Updated last year
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated last month
- ☆17Updated 2 years ago
- A cyber security oriented interpreted programming language designed to make your experience with cyber security (offensive and defensive)…☆18Updated last year
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- In this repository, I will collect quick and simple code examples that use Python to automate various #osint tasks.☆57Updated last year
- This script monitors a Bitcoin wallet address and notifies the user when there are changes in the balance or new transactions.☆24Updated 2 years ago
- Show the marketplace profile from FB☆14Updated 3 years ago
- Nexus of Android banking Trojans☆15Updated last year