Nice list of google dorks for SQL injection
☆135May 12, 2018Updated 7 years ago
Alternatives and similar repositories for SQL-injection-dorks-list
Users that are interested in SQL-injection-dorks-list are comparing it to the libraries listed below
Sorting:
- Dorks Hacking Database for educational proposal☆86Jan 8, 2021Updated 5 years ago
- Common google dorks and others you prolly donn know :P☆38Jul 28, 2014Updated 11 years ago
- I'm uploading dorks here.☆53Nov 7, 2015Updated 10 years ago
- 7,000 Dorks for hacking into various sites☆171Aug 4, 2022Updated 3 years ago
- Dorks for Google, Shodan and BinaryEdge☆142Mar 3, 2020Updated 5 years ago
- this is a complete guide if you want to become in a black hat hacker but remember this is illegal☆13May 30, 2024Updated last year
- An SSRF detector tool written in golang. I have fixed some errors and added some more payloads to it. But the tool credits go to z0idsec.☆45Feb 10, 2021Updated 5 years ago
- Github Hacking Database - My personal collection of Github Dorks to search for Confidential Information (Yes, it's a Github version of Go…☆242Nov 24, 2025Updated 3 months ago
- Recon Automation☆11Sep 14, 2024Updated last year
- Google Dorks | Google helps you to find Vulnerable Websites that Indexed in Google Search Results. Here is the latest collection of Googl…☆1,743Jan 31, 2026Updated last month
- ☆84Jul 25, 2017Updated 8 years ago
- Advance Google Dorker and Vulnerability Scanner☆50Oct 29, 2018Updated 7 years ago
- A python script to perform dorks using DuckDuckGo search engine.☆90Jan 11, 2019Updated 7 years ago
- ☆18Mar 23, 2023Updated 2 years ago
- ☆21Aug 3, 2022Updated 3 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- dotfiles☆11Feb 20, 2026Updated last week
- Shodan Dorks☆547Mar 31, 2023Updated 2 years ago
- Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.☆517May 26, 2020Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Simple Admin Finder☆11Apr 25, 2023Updated 2 years ago
- Automating the SQL Injection through Google dorks.☆26Sep 30, 2022Updated 3 years ago
- google hack database automation tool☆204Oct 5, 2017Updated 8 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- IT Security tools☆12Nov 12, 2021Updated 4 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- ☆10Feb 22, 2023Updated 3 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- World's most Powerful and Advanced Cross Site Scripting Software☆28Jan 5, 2020Updated 6 years ago
- Pipe different tools with google dork Scanner☆56Jun 25, 2020Updated 5 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- Listing subdomains about a main domain☆59May 9, 2018Updated 7 years ago
- Complite Web Application Penetration Testing☆27Jul 9, 2021Updated 4 years ago