ivan-sincek / chadLinks
Search Google Dorks like Chad. / Broken link hijacking tool.
☆30Updated 4 months ago
Alternatives and similar repositories for chad
Users that are interested in chad are comparing it to the libraries listed below
Sorting:
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆36Updated 2 weeks ago
- PHP lab to test captcha bypassing☆30Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆71Updated 8 months ago
- Perform OSINT on external targets using Shodan☆22Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Updated last year
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆35Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆35Updated 11 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆15Updated 3 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆24Updated 3 years ago
- medor is an OSINT tool that enables you to discover a WordPress website IP behind a WAF or behind Onion Services.☆18Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 3 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆45Updated 8 months ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆45Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆96Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- ☆14Updated 10 months ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Updated 3 years ago
- A small and efficient tool to find open redirect vulnerabilities.☆17Updated 4 years ago
- Kali Packerge Manager☆63Updated 2 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆25Updated last month
- Powerful advanced web platform for C2 managing and automated penetration testing.☆15Updated 2 years ago