kh4sh3i / Shodan-DorksLinks
a curated list of shodan dorks for finding sensitive data in shodan.io
☆30Updated last year
Alternatives and similar repositories for Shodan-Dorks
Users that are interested in Shodan-Dorks are comparing it to the libraries listed below
Sorting:
- xdebug 2.5.5 RCE exploit☆31Updated 6 months ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆48Updated 8 months ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆42Updated 2 years ago
- PHP lab to test captcha bypassing☆31Updated last year
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆62Updated 4 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆53Updated 2 years ago
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …☆46Updated last year
- Python3 script to dump breach data from Dehashed☆32Updated 2 weeks ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 10 months ago
- A small and efficient tool to find open redirect vulnerabilities.☆16Updated 3 years ago
- Evildork targeting your fiancee👁️☆87Updated last year
- Web Exploit here ! advanced web hacking and hacker toolkit in your hands☆37Updated 11 months ago
- Perform With Massive Wordpress Enumeration☆11Updated last year
- Fastest tool to find username and password brute forcing.☆74Updated last year
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated last month
- A Simple Script For SSH BruteForce☆36Updated last year
- Perform With Mass Exploiter In Joomla 4.2.8.☆34Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆24Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆104Updated last year
- This Tool bypass 403/401. This script contain all the possible techniques to do the bypass☆44Updated 9 months ago
- An Simple PHP Webshell Manager to bypassed security system☆21Updated 11 months ago
- Ultimate Google Dork Lists OSWP top 10☆56Updated 11 months ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆44Updated 11 months ago
- RedTeam - Red Team Tools☆47Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆39Updated last year
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆41Updated 3 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆59Updated 3 years ago