kh4sh3i / Shodan-DorksLinks
a curated list of shodan dorks for finding sensitive data in shodan.io
☆30Updated last year
Alternatives and similar repositories for Shodan-Dorks
Users that are interested in Shodan-Dorks are comparing it to the libraries listed below
Sorting:
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆42Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆32Updated 2 months ago
- || Activate Burp Suite Pro with Loader and Key-Generator ||☆35Updated 4 years ago
- POC exploit for CVE-2015-10141☆30Updated 2 weeks ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆105Updated last year
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆45Updated last year
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆63Updated 4 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆48Updated 9 months ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆47Updated 2 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆146Updated 10 months ago
- A collection of awesome software, OSINT Tools, libraries, learning tutorials, documents, books & technical resources and cool stuff about…☆50Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆60Updated 3 years ago
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆23Updated last year
- Boost website hits by generating requests from multiple proxy IPs.☆74Updated last year
- Tracer is an OSINT tool that can be used to detect on which websites a username is currently in use☆117Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 11 months ago
- Ultimate Google Dork Lists OSWP top 10☆56Updated last year
- List of Github repositories and articles with list of dorks for different search engines☆30Updated 3 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …☆46Updated 2 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆43Updated last year
- Bypass 403☆165Updated 6 months ago
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆24Updated 2 years ago
- Updated 6000 Sql Injection Google Dork 2021☆38Updated 4 years ago
- License Compatible Python2x Python3x Pure Blood v2 A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter Menu We…☆24Updated 4 years ago
- Cloning apk for bypassing code tampering detection, Google Safety Net and scanning vulnerable plugins☆84Updated 2 years ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dum…☆34Updated 2 months ago
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆68Updated 7 months ago