ivan-sincek / chad
Search Google Dorks like Chad. / Broken link hijacking tool.
β24Updated last month
Related projects β
Alternatives and complementary repositories for chad
- γπͺγThe hidden hookless backdoorβ10Updated 2 years ago
- Powerful advanced web platform for C2 managing and automated penetration testing.β14Updated last year
- Network/host scanner and information gathererβ25Updated last year
- Find existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve caβ¦β15Updated last year
- Bypass 4xx HTTP response status codes and more. Based on PycURL.β14Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Emailβ12Updated 3 weeks ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writteβ¦β27Updated 2 years ago
- A simple tool to check if an email is associated with an Instagram account. Useful for OSINT and verifying account existence. π΅οΈββοΈβ¨β14Updated last month
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, resβ¦β72Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &β¦β37Updated 2 years ago
- Nqntnqnqmb transform maltegoβ24Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.β30Updated 2 weeks ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFsβ11Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windowsβ16Updated 2 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of β¦β14Updated 5 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.β54Updated 2 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCPβ17Updated this week
- Brute forcing login pages with SQL Injection queries with cURLβ17Updated last year
- a curated list of shodan dorks for finding sensitive data in shodan.ioβ27Updated 4 months ago
- PHP lab to test captcha bypassingβ31Updated 10 months ago
- Maltego transform for hunter.ioβ34Updated 3 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwardingβ12Updated 4 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bountyβ13Updated 3 years ago
- Install an arsenal of OSINT tools by running IntelBox on your Debian VM or OSβ12Updated 2 years ago
- Quidam maltego transformβ37Updated 4 years ago
- Updated 6000 Sql Injection Google Dork 2021β30Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisionsβ11Updated 2 years ago
- Another vulnerability scannerβ17Updated last year
- Perform OSINT on external targets using Shodanβ21Updated 9 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test iβ¦β35Updated last month