keralahacker / g-dorks
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using. Google dorking could also be used for OSINT
☆15Updated 4 years ago
Alternatives and similar repositories for g-dorks
Users that are interested in g-dorks are comparing it to the libraries listed below
Sorting:
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 5 years ago
- Keylogger for ethical hackers☆15Updated 3 years ago
- Tools for Pentesting that all hacker need....☆17Updated 2 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- SQLi Google Dork Scanner (new version)☆16Updated 3 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆17Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- Hax is a mini-tool with really useful hacking tools.☆18Updated 2 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆15Updated 5 years ago
- This tool is used to find the admin login page of a website.☆16Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆54Updated 7 years ago
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- Reverse And Dorking Tools☆25Updated 4 years ago
- Sniffnet is a toolkit what is going to help you hacking in the global web. Tools: sqlmap, nikto, nmap, shodan, ping, adminpagefinder, ng…☆26Updated 6 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆21Updated 4 years ago
- An advance keylogger that works and also logs special keys.☆19Updated 2 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- Multi-client Cross-platform Python Backdoor/Reverse Shell/RAT with AES Encryption☆7Updated 2 years ago
- People Profiler (fake script)☆23Updated 7 months ago
- Tools for gathering information and actions forensic☆20Updated 6 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 2 months ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- Trinetra is Web Crawling Tool For Bug Bounty And Web Pentesters It will Help To Spider Url's From Web And It will Gain Url Info From Web…☆9Updated 3 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆16Updated 2 years ago
- IP-Finder is an Open Source Intelligence (OSINT) tool that helps collect IPs of Companies, Servers, Operating Systems and much more. It a…☆12Updated 3 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26Updated 5 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 10 months ago
- Link Reveal☆24Updated 7 months ago
- FBleaker will extract email from your facebook and try to find there password if they ever get leaked☆32Updated 5 years ago