kh4sh3i / Shodan-DorksLinks
a curated list of shodan dorks for finding sensitive data in shodan.io
☆33Updated last year
Alternatives and similar repositories for Shodan-Dorks
Users that are interested in Shodan-Dorks are comparing it to the libraries listed below
Sorting:
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆42Updated 2 years ago
- List of Github repositories and articles with list of dorks for different search engines☆31Updated 3 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆105Updated 2 years ago
- Boost website hits by generating requests from multiple proxy IPs.☆74Updated last year
- Python3 script to dump breach data from Dehashed☆32Updated 2 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆147Updated 11 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆45Updated last year
- Bypass 403☆165Updated 7 months ago
- Updated 6000 Sql Injection Google Dork 2021☆40Updated 4 years ago
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆73Updated 4 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆63Updated 4 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆60Updated 3 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆57Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆23Updated 2 years ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆56Updated 3 months ago
- A collection of awesome software, OSINT Tools, libraries, learning tutorials, documents, books & technical resources and cool stuff about…☆54Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆49Updated 10 months ago
- Search GitHub for public Shodan api keys☆78Updated last year
- POC exploit for CVE-2015-10141☆30Updated last month
- OSINT automation for hackers.☆16Updated 2 years ago
- Google dorking tool☆235Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆108Updated 9 months ago
- Dump place details from Google Maps like phone,email,website,and reviews☆69Updated 3 months ago
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dum…☆37Updated 3 months ago
- A certificate transparency log keyword sniffer written in python☆82Updated 2 years ago
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆42Updated 9 months ago