A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.
☆108Sep 6, 2023Updated 2 years ago
Alternatives and similar repositories for SXDork
Users that are interested in SXDork are comparing it to the libraries listed below
Sorting:
- Find Email Spoofing Vulnerablity of domains☆97Jul 30, 2024Updated last year
- Checks if the given emails have been pwned.☆15May 22, 2023Updated 2 years ago
- ☆109Feb 21, 2023Updated 3 years ago
- Domain Parser for IPAddress.com Reverse IP Lookup☆85Jan 2, 2023Updated 3 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆479Sep 17, 2025Updated 5 months ago
- ☆36Apr 24, 2024Updated last year
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- Azure AD enumeration over MS Graph☆81Nov 30, 2022Updated 3 years ago
- Dompdf RCE PoC Exploit - CVE-2022-28368☆16Jan 19, 2024Updated 2 years ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Feb 25, 2026Updated last week
- a script designed to help identify vulnerabilities and misconfigurations on a Linux system☆19Dec 31, 2022Updated 3 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆11Mar 2, 2019Updated 7 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆180Feb 14, 2023Updated 3 years ago
- Registry hive parsing the async way☆25Oct 29, 2025Updated 4 months ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- WASI libc implementation for WebAssembly☆15Jan 28, 2025Updated last year
- ☆13Mar 1, 2024Updated 2 years ago
- Very messy code, made this for testing, is/was working. Mobile and Web API.☆11Dec 1, 2022Updated 3 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Nov 12, 2023Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆244Jul 3, 2024Updated last year
- Lfi Scan Tool☆108May 16, 2023Updated 2 years ago
- 🐍 Python Exploit for CVE-2022-23935☆11Feb 10, 2023Updated 3 years ago
- CSR2F is a Python tool used for generating CSRF (Cross-Site Request Forgery) exploits☆13Aug 22, 2019Updated 6 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated 11 months ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆15Nov 2, 2022Updated 3 years ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- A tool to embed files into images☆14Feb 10, 2021Updated 5 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆55Apr 28, 2022Updated 3 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆406Jan 22, 2025Updated last year
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Aug 31, 2022Updated 3 years ago
- Searches and tests SQL dorks to find vulnerable sites.☆10Oct 15, 2019Updated 6 years ago
- A small project I made for educational purposes, I wanted to see how small and fast I could make it.☆10Feb 13, 2021Updated 5 years ago