A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search queries.
☆32Mar 4, 2026Updated 2 weeks ago
Alternatives and similar repositories for dumpdork
Users that are interested in dumpdork are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through fo…☆19Nov 21, 2025Updated 4 months ago
- DepthSearch is a deep web OSINT tool that enables powerful, anonymous searches across deep web search engines. It features proxy support,…☆25Oct 26, 2024Updated last year
- DNS resolution tracing tool☆35Jun 29, 2021Updated 4 years ago
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆36Oct 17, 2021Updated 4 years ago
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆44Sep 22, 2024Updated last year
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 3 months ago
- V8sandbox_bypass using stack misalignment☆23Aug 25, 2024Updated last year
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Provides temporary admin access for a standard user via Jamf Self Service☆10Oct 25, 2023Updated 2 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- Summary and archive of Vatican .va (Holy See) ccTLD zone data for researchers.☆13Apr 26, 2023Updated 2 years ago
- Nuclei plugins to audit Chrome extensions☆65Jul 16, 2024Updated last year
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- Here are some cool and some unpublished Dorks☆82Jan 17, 2025Updated last year
- 🚀 CSRFShark - a utility for manipulating cross-site request forgery attacks☆36Sep 12, 2023Updated 2 years ago
- ☆14Dec 31, 2024Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 11 months ago
- ☆18Jun 25, 2024Updated last year
- ☆15Dec 12, 2023Updated 2 years ago
- ☆13May 21, 2025Updated 10 months ago
- ☆12Jul 4, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆10Jun 15, 2024Updated last year
- Enable-All-Tokens is a Go-based project designed to adjust and enable a list of specified privileges for the current process token on a W…☆10Apr 21, 2025Updated 11 months ago
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- Pentest automation resources for Burp☆15Mar 10, 2024Updated 2 years ago
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- ☆16Jul 14, 2020Updated 5 years ago
- ☆15Jun 15, 2021Updated 4 years ago
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆140Dec 7, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated 2 years ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆36Nov 5, 2024Updated last year
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques. It automates the process of discovering the real orig…☆171Feb 22, 2026Updated last month
- Brew Local Privilege Escalation exploit on Intel macOS☆19Mar 6, 2024Updated 2 years ago