keralahacker / g-dorksLinks
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using. Google dorking could also be used for OSINT
☆15Updated 4 years ago
Alternatives and similar repositories for g-dorks
Users that are interested in g-dorks are comparing it to the libraries listed below
Sorting:
- Mass Social Engineering tool and Email and Account Extraction (Random Brute Force Discovery) and Password Brute Force through Tor.☆23Updated 4 years ago
- H-SPLOIT-PAYLOAD GENERATE METASPLOIT PAYLOAD IN 1 CLICK☆31Updated 3 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆16Updated 3 years ago
- forked from linux choice☆21Updated 6 years ago
- People Profiler (fake script)☆23Updated 7 months ago
- Automating the SQL Injection through Google dorks.☆24Updated 2 years ago
- Simple tool to scanning sql injection vulnerability, easy to use!!☆15Updated 5 years ago
- Tools for Pentesting that all hacker need....☆17Updated 2 years ago
- gathering or searching websites that are vulnerable to sql injection ( GUI Tools )☆35Updated 5 years ago
- FUD Win32 Keylogger and Reverse Shell (cmd.exe)☆18Updated 2 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆17Updated 3 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali now with windows support☆9Updated 2 months ago
- SHELL SCANNER☆19Updated 6 years ago
- Tools for gathering information and actions forensic☆20Updated 6 years ago
- This is useful if you are running an investigation to determine the usage of the same username on different social networks.☆12Updated 4 years ago
- Keylogger for ethical hackers☆15Updated 3 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆23Updated 4 years ago
- Android-PIN-Bruteforce☆18Updated 3 years ago
- 🔥Ready, Aim, Fire.🔥☆16Updated 3 years ago
- i will post updates on my instagram @unkn0wn_bali tufhub - a hacking framework with all kinds of bruteforce, info gather, dos attack,…☆14Updated 6 years ago
- WH-Rat for windows and Android : Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It…☆12Updated 4 years ago
- Reverse And Dorking Tools☆25Updated 4 years ago
- dump Leak username password & cheker☆16Updated 3 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆30Updated 7 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. It’s a proxy-based too…☆9Updated 4 years ago
- New phishing tool with 30+ templates updated tool☆10Updated last year
- This tool is used to find the admin login page of a website.☆16Updated 4 years ago
- Automated Password Cracking Tool☆17Updated 4 years ago
- XploitSPY is an Android Monitoring / Spying Tool☆23Updated 5 years ago