ivan-sincek / chadLinks
Search Google Dorks like Chad. / Broken link hijacking tool.
☆30Updated 2 months ago
Alternatives and similar repositories for chad
Users that are interested in chad are comparing it to the libraries listed below
Sorting:
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆71Updated 6 months ago
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 weeks ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 6 months ago
- PHP lab to test captcha bypassing☆30Updated last year
- medor is an OSINT tool that enables you to discover a WordPress website IP behind a WAF or behind Onion Services.☆17Updated last year
- 🧬 Extract and analyze contributors info from git repos☆83Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆45Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆14Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- APK Infrastructure Investigator☆65Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆127Updated last year
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆34Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Updated last year
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆72Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆53Updated last year
- Kali Packerge Manager☆65Updated 2 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- ☆13Updated 8 months ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆50Updated 10 months ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆35Updated 9 months ago
- SMTP Open Relay Exploitation☆17Updated 5 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Reaper of screencast videos for OSINT purposes☆20Updated last year
- Terminal based fake identity generator.☆26Updated 2 years ago