ivan-sincek / chad
Search Google Dorks like Chad. / Broken link hijacking tool.
☆27Updated 2 months ago
Alternatives and similar repositories for chad:
Users that are interested in chad are comparing it to the libraries listed below
- Powerful advanced web platform for C2 managing and automated penetration testing.☆14Updated last year
- Strumenti per Domini - Whois - IP - Data Breach - Email☆15Updated 4 months ago
- Find existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve ca…☆15Updated last year
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆11Updated 2 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- 「🚪」The hidden hookless backdoor☆12Updated 3 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Network/host scanner and information gatherer☆25Updated last year
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 2 years ago
- Fast scanner for exposed env files☆11Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- This repo is just a guide where you can find all labs of burp suite resolved, you can see the workflow and all type of web attacks☆13Updated 2 years ago
- Payloads and Lists☆20Updated 5 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Updated last year
- Another vulnerability scanner☆18Updated this week
- a curated list of shodan dorks for finding sensitive data in shodan.io☆27Updated 7 months ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆13Updated 11 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆32Updated last week
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆78Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- Maltego transform for hunter.io☆38Updated 3 years ago
- Automate email search in HaveIBeenPwned☆11Updated 3 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆40Updated 4 months ago
- Terminal based fake identity generator.☆27Updated last year
- Brute force a REST API query through WebSocket. Based on cURL.☆9Updated last year
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆19Updated 2 years ago
- Leakix Searcher☆13Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year