ivan-sincek / chadLinks
Search Google Dorks like Chad. / Broken link hijacking tool.
☆30Updated 4 months ago
Alternatives and similar repositories for chad
Users that are interested in chad are comparing it to the libraries listed below
Sorting:
- PHP lab to test captcha bypassing☆30Updated 2 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆71Updated 7 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆34Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last month
- Strumenti per Domini - Whois - IP - Data Breach - Email☆18Updated last year
- Perform OSINT on external targets using Shodan☆22Updated last year
- This is a working variant of the Mirai IOT botnet☆14Updated 3 years ago
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆44Updated 2 years ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Viber Osint helper tool to save your time through automation and help you find registered users.☆55Updated 2 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆73Updated 2 years ago
- SMTP Open Relay Exploitation☆16Updated 5 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆130Updated last year
- ☆14Updated 10 months ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 2 months ago
- Kali Packerge Manager☆63Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆56Updated last year
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆21Updated 2 years ago
- 🧬 Extract and analyze contributors info from git repos☆83Updated 2 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆55Updated 2 weeks ago