kh4sh3i / Shodan-DorksLinks
a curated list of shodan dorks for finding sensitive data in shodan.io
☆29Updated 10 months ago
Alternatives and similar repositories for Shodan-Dorks
Users that are interested in Shodan-Dorks are comparing it to the libraries listed below
Sorting:
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆42Updated last year
- Python3 script to dump breach data from Dehashed☆31Updated last month
- xdebug 2.5.5 RCE exploit☆31Updated 4 months ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- PHP lab to test captcha bypassing☆31Updated last year
- World's most Powerful and Advanced Cross Site Scripting Software☆28Updated 5 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆53Updated 2 years ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆34Updated last year
- Rockyou for web fuzzing☆14Updated 3 years ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆13Updated 4 years ago
- ☆27Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆40Updated 9 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆17Updated 3 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 3 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Top password lists generated from leaks collected from different paste sites☆31Updated 2 years ago
- ☆74Updated last year
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆94Updated 10 months ago
- Perform With Massive Wordpress Enumeration☆11Updated last year
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dum…☆29Updated last week
- Tool to parse Stealer Logs.☆16Updated last year
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated 2 years ago
- ☆14Updated 2 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆41Updated 2 weeks ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆75Updated last year
- Updated 6000 Sql Injection Google Dork 2021☆38Updated 3 years ago
- Search Google Dorks like Chad. / Broken link hijacking tool.☆28Updated this week