ivan-sincek / chadLinks
Search Google Dorks like Chad. / Broken link hijacking tool.
☆30Updated last month
Alternatives and similar repositories for chad
Users that are interested in chad are comparing it to the libraries listed below
Sorting:
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- Dump place details from Google Maps like phone,email,website,and reviews☆69Updated 4 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆53Updated 7 months ago
- This is a working variant of the Mirai IOT botnet☆14Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆44Updated 2 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- PHP lab to test captcha bypassing☆30Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last week
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 5 months ago
- Python-based web scraper for a darkweb marketplace on the Tor network.☆35Updated last year
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆119Updated last year
- OSINT tool to find info about your old pages.☆19Updated 3 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 9 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 10 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- ☆16Updated 2 years ago
- ☆13Updated 7 months ago
- POC exploit for CVE-2015-10141☆30Updated 2 months ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆20Updated 3 years ago
- Terminal based fake identity generator.☆25Updated 2 years ago
- Subscan is a simple tool for subdomain scanner, it can scan subdomains fast.☆39Updated 2 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆10Updated 2 years ago
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆40Updated 6 months ago
- Repository of tools used in my blog☆51Updated last year
- medor is an OSINT tool that enables you to discover a WordPress website IP behind a WAF or behind Onion Services.☆17Updated last year
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆36Updated 2 years ago