mes3hacklab / thedorksideofgoogle
Google dorks generator to find open shells (on government sites)
☆29Updated 10 years ago
Alternatives and similar repositories for thedorksideofgoogle:
Users that are interested in thedorksideofgoogle are comparing it to the libraries listed below
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Wordpress AFD dl-skin.php Exploit☆15Updated 7 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆28Updated 4 years ago
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- web information gathering / Grab links☆42Updated 5 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- A standalone addon for GnuPG☆18Updated 6 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 4 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Collection of cracked malware☆14Updated 6 years ago
- RExploit (Router Exploitation) is a tool that search exploits for any router SOHO. It is written on Python and QT.☆24Updated 8 years ago
- CTF Writeups☆19Updated 7 years ago
- Framework for obtaining all the credentials stored in vulnerable Netwave IP cameras. Can be used to break into IP cameras, use for resear…☆36Updated 5 years ago
- Generate customized and undetectable exploits for Metasploit.☆23Updated 7 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆54Updated 3 years ago
- Password cracking utility☆53Updated 3 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆26Updated 8 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- ☆29Updated 4 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆14Updated 5 years ago