mes3hacklab / thedorksideofgoogle
Google dorks generator to find open shells (on government sites)
☆29Updated 10 years ago
Alternatives and similar repositories for thedorksideofgoogle:
Users that are interested in thedorksideofgoogle are comparing it to the libraries listed below
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 8 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆28Updated 4 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Password cracking utility☆53Updated 3 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- Python tool for Dorking☆11Updated last year
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 9 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Simple security surveillance script for linux distributions.☆58Updated 8 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆36Updated 5 years ago
- This module captures SQL traffic using MITM techinques, and replace a given statement with a new one.☆12Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆15Updated 11 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- All xxx-arsenal repos in one☆15Updated 6 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆11Updated 8 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- log file scrubber☆15Updated 6 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- SpyEye v1.3 bug exploiter (frm_findftp_sub.php)☆18Updated 6 years ago
- web information gathering / Grab links☆42Updated 5 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆32Updated 8 years ago
- Reverse/ Bind Shell Generator for cross platform systems☆19Updated 6 years ago
- flood area with fake essids☆20Updated 7 years ago