kh4sh3i / Shodan-DorksLinks
a curated list of shodan dorks for finding sensitive data in shodan.io
☆36Updated last year
Alternatives and similar repositories for Shodan-Dorks
Users that are interested in Shodan-Dorks are comparing it to the libraries listed below
Sorting:
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆108Updated 2 years ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆44Updated last year
- POC exploit for CVE-2015-10141☆30Updated 5 months ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆47Updated last year
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆160Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆44Updated 2 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆62Updated 3 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆27Updated 3 years ago
- List of Github repositories and articles with list of dorks for different search engines☆32Updated 3 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆64Updated 4 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Wpushell is a tool used to upload a backdoor shell to a site that uses a WordPress Content Management System with a simple and fast proce…☆26Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆45Updated 8 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- A tool to download the breach data on BreachForums CND that was uploaded to the threat actor USDoD's CDN.☆63Updated last year
- ScopeHunter is a command-line tool for finding in scope targets for bug bounty programs.☆73Updated last year
- PHP CGI Argument Injection (CVE-2024-4577) RCE☆24Updated last year
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search …☆43Updated last year
- Ultimate Google Dork Lists OSWP top 10☆57Updated last year
- Security testing tool for analyzing HTTP 403 responses and identifying access control misconfigurations in web applications.☆165Updated 3 weeks ago
- A simple tool to check if an email is associated with an Instagram account. Useful for OSINT and verifying account existence. 🕵️♂️✨☆19Updated last year
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Updated 4 years ago
- PhantomCrawler is a Python-based web testing and research tool that simulates website interactions from multiple proxy IP addresses to an…☆74Updated 3 weeks ago
- Google dorking tool☆244Updated 3 weeks ago
- Python3 script to dump breach data from Dehashed☆40Updated 7 months ago
- Dump place details from Google Maps like phone,email,website,and reviews☆71Updated 7 months ago
- A collection of awesome software, OSINT Tools, libraries, learning tutorials, documents, books & technical resources and cool stuff about…☆80Updated last year