sdushantha / doraLinks
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
☆335Updated last year
Alternatives and similar repositories for dora
Users that are interested in dora are comparing it to the libraries listed below
Sorting:
- Subdomain finder☆369Updated last year
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆357Updated 2 years ago
- ☆395Updated 3 years ago
- Jbin will gather all the URLs from the website and then it will try to expose the secret data from them such as API keys, API secrets, AP…☆165Updated 3 years ago
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆316Updated 3 years ago
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆262Updated last year
- Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.☆248Updated 3 weeks ago
- Get related domains / subdomains by looking at Google Analytics IDs☆250Updated 3 years ago
- Automated Recon for Pentesting & Bug Bounty☆428Updated last year
- Turns any junk text into a usable wordlist for brute-forcing.☆223Updated last year
- WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.☆194Updated 2 years ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆537Updated last year
- Golang client for querying SecurityTrails API data☆571Updated 2 years ago
- list of regex patterns for oauth / api tokens with provided source☆274Updated 8 months ago
- A Security Tool for Enumerating WebSockets☆361Updated 3 years ago
- Find subdomains with GPT, for free☆348Updated last year
- Simple Google Dorks search tool☆303Updated 2 weeks ago
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆220Updated last week
- GraphQL automated security testing toolkit☆325Updated last year
- Wordlists handcrafted (and automated) with ♥☆217Updated last month
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆461Updated last month
- Heuristic Vulnerable Parameter Scanner☆597Updated last year
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆402Updated 8 months ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆437Updated last year
- Takes a list of URLs and returns their HTTP response codes☆400Updated last year
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆199Updated 3 years ago
- smartrecon is a powerful shell script to automate the recon and finding common vulnerabilities for bug hunter☆155Updated last year
- Http request smuggling vulnerability scanner☆229Updated 3 years ago
- Little Bug Bounty & Hacking Tools⚔️☆365Updated 10 months ago
- Google Dork File Finder☆196Updated 8 months ago