mukarramkhalid / google-scraperLinks
[Python] Google Scraper & Mass Exploiter
☆30Updated 4 years ago
Alternatives and similar repositories for google-scraper
Users that are interested in google-scraper are comparing it to the libraries listed below
Sorting:
- pwning & info gathering via user browser☆39Updated 10 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 9 years ago
- A security write-up about the Paypal API & data leakage☆25Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Updated 8 years ago
- ☆25Updated 11 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- Projects and POCs☆61Updated 11 years ago
- A python script for obfuscating wireless networks☆79Updated 9 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Updated 10 years ago
- Joomla 3.2 to 3.4.4 Remote SQL Injection Mass Exploit☆29Updated 4 years ago
- Some exploits for ZeroNights 0x03☆36Updated 10 years ago
- Recursively searches a directory for any file containing a specified string☆48Updated 10 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- A modular distributed penetration testing tool.☆41Updated 9 years ago
- A simple tool to dump users in popular forums and CMS :)☆31Updated 8 years ago
- Shell-style script to search exploit-db.com exploits.☆61Updated last year
- PHP Phishing Framework☆28Updated 12 years ago
- a javascript keylogger included in a gif file☆39Updated 5 months ago
- ssh session type for metasploit☆101Updated 3 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 10 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆22Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- ☆10Updated 9 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 13 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- A tool to help you manage your leaks☆34Updated 8 years ago
- Multi source CVE/exploit parser.☆27Updated 8 years ago
- Crawl Google and Bing to find emails, subdomains and URLs associated to a target domain☆50Updated 5 years ago
- Reverse to use in a batfile which can call the ip and ports from itself☆25Updated 5 years ago