ivan-sincek / chadLinks
Search Google Dorks like Chad. / Broken link hijacking tool.
☆30Updated 2 months ago
Alternatives and similar repositories for chad
Users that are interested in chad are comparing it to the libraries listed below
Sorting:
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆69Updated 2 months ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆54Updated 5 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆51Updated 7 months ago
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- PHP lab to test captcha bypassing☆31Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 3 months ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆49Updated 6 months ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 8 months ago
- Viber Osint helper tool to save your time through automation and help you find registered users.☆55Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆42Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆120Updated last year
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- Another vulnerability scanner☆19Updated 2 weeks ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆72Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆47Updated 9 months ago
- ☆17Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- ☆14Updated 5 months ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆24Updated 2 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆32Updated 6 months ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆19Updated 2 years ago
- POC exploit for CVE-2015-10141☆30Updated 2 weeks ago