keralahacker / g-dorksLinks
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using. Google dorking could also be used for OSINT
☆15Updated 4 years ago
Alternatives and similar repositories for g-dorks
Users that are interested in g-dorks are comparing it to the libraries listed below
Sorting:
- Phishing tool with 26 platforms and custom subdomain names☆9Updated 4 years ago
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆37Updated 5 years ago
- Keylogger for ethical hackers☆15Updated 3 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆23Updated 5 years ago
- Blackvenom is a python based Script. Blckvenom is an automated tool that can generate payload using metasploit. You can generate payload …☆33Updated 2 years ago
- Anubis 7.0☆27Updated 10 months ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- Complete and modifyable ransomware program☆11Updated 4 years ago
- A single tool to bruteforce pdf , zip and hashes very super fast tool developed with python3☆50Updated 2 years ago
- Eficaz herramienta capaz de inyectar un backdoor a casi cualquier app Android actual☆38Updated 4 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆15Updated 5 years ago
- python script that hide phishing url like a pro "masking url technique"☆42Updated 4 years ago
- Keylogger using pynput + mail sender☆54Updated 4 years ago
- Reverse And Dorking Tools☆25Updated 4 years ago
- An Android spyware which interacts with a remote C&C server to exfiltrate phone data☆75Updated 5 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- 19 Social Media Phishing Pages #phishing #shellphish #phish☆14Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- SQLi Google Dork Scanner (new version)☆16Updated 3 years ago
- Platform for a noob hacker to learn hacking on localhost.☆12Updated 8 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆19Updated 3 years ago
- Latest FUD GMail phishing webpage generator☆29Updated 5 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆14Updated 6 years ago
- this tool only for educational purpose . Disclaimer: We are no responsibility any action . if you want you use for educational purpose …☆8Updated 5 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26Updated 5 years ago
- hashcrack is a python script which uses online hash crackers to find cleartext of a hash in less than 3 seconds☆46Updated 7 years ago
- #Just simple program to spoofing device by sending malicious link☆30Updated 3 years ago
- This is a guide for Penetration Testers how to use Penetration Testing tools and their advanced used. Need everyone's help to make it bat…☆50Updated 4 years ago
- Automating the SQL Injection through Google dorks.☆26Updated 2 years ago