kh4sh3i / Shodan-DorksLinks
a curated list of shodan dorks for finding sensitive data in shodan.io
☆33Updated last year
Alternatives and similar repositories for Shodan-Dorks
Users that are interested in Shodan-Dorks are comparing it to the libraries listed below
Sorting:
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆107Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆42Updated last year
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆55Updated last year
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆45Updated 2 years ago
- A collection of awesome software, OSINT Tools, libraries, learning tutorials, documents, books & technical resources and cool stuff about…☆65Updated last year
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆26Updated 2 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆64Updated 4 years ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆46Updated last year
- Boost website hits by generating requests from multiple proxy IPs.☆75Updated last year
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Updated last year
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆43Updated last year
- Sphinx.bot is a platform for collecting data leaks. All information recorded here is publicly available on the web. Any malicious use of …☆46Updated 2 years ago
- Wordpress Hunting Vulnerabilities and Bruteforce tool using Google Dork☆15Updated 4 years ago
- Proof of concept denial of service over TOR stress test tool☆42Updated 7 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆73Updated 4 years ago
- List of Github repositories and articles with list of dorks for different search engines☆32Updated 3 years ago
- A collection of hacks and one-off scripts☆18Updated 4 years ago
- proxychains is a tool that forces any TCP connection made by any given application to follow through proxy like TOR or any other SOCKS4, …☆33Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆38Updated 5 months ago
- An Simple PHP Webshell Manager to bypassed security system☆21Updated last year
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks — including stealer logs, credential dum…☆43Updated 6 months ago
- A PasteBin scrapper that doesnt rely on the PasteBin scrape API☆72Updated 3 years ago
- Ultimate Google Dork Lists OSWP top 10☆56Updated last year
- A Simple Script For SSH BruteForce☆38Updated 2 years ago
- POC exploit for CVE-2015-10141☆30Updated 4 months ago
- VOID is for scanning and hacking. There is many popular tools in VOID. You can scan web databases and vulnerabilities. Also you can brute…☆38Updated 3 years ago
- All In One, Fast, Easy Recon Tool☆87Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated last year