sdushantha / doraLinks
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
☆335Updated last year
Alternatives and similar repositories for dora
Users that are interested in dora are comparing it to the libraries listed below
Sorting:
- Subdomain finder☆369Updated last year
- Jbin will gather all the URLs from the website and then it will try to expose the secret data from them such as API keys, API secrets, AP…☆166Updated 3 years ago
- XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.☆314Updated 3 years ago
- Http request smuggling vulnerability scanner☆229Updated 3 years ago
- Automated Recon for Pentesting & Bug Bounty☆426Updated last year
- Generate Email, Register for anything, Get the OTP/Link☆588Updated 2 years ago
- Heuristic Vulnerable Parameter Scanner☆598Updated last year
- ☆404Updated 3 years ago
- A command-line utility designed to discover URLs for a given domain in a simple, efficient way. It works by gathering information from a …☆641Updated 3 weeks ago
- Fleex makes it easy to create multiple VPS on cloud providers and use them to distribute workloads.☆262Updated last year
- Get related domains / subdomains by looking at Google Analytics IDs☆250Updated 3 years ago
- Automation Recon tool which works with Large & Medium scopes. It performs a lot of tasks and gets back all the results in separated files…☆683Updated last year
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆538Updated last year
- Wordlists handcrafted (and automated) with ♥☆220Updated 2 months ago
- DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets☆237Updated 4 years ago
- A fast tool to fetch URLs from HTML attributes by crawl-in.☆259Updated 8 months ago
- Recon is a script to perform a full recon on a target with the main tools to search for vulnerabilities. Created based on @ofjaaah and @J…☆209Updated 3 years ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆464Updated last month
- Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.☆248Updated 3 weeks ago
- Turns any junk text into a usable wordlist for brute-forcing.☆223Updated last year
- GraphQL automated security testing toolkit☆325Updated last year
- Astra is a tool to find URLs and secrets inside a webpage/files☆212Updated 2 years ago
- Find subdomains with GPT, for free☆349Updated last year
- Google Dork File Finder☆196Updated 9 months ago
- Keyfinder🔑 is a tool that let you find keys while surfing the web!☆550Updated 2 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆356Updated 2 years ago
- Extension for Burp Suite which uses AWS API Gateway to rotate your IP on every request.☆263Updated last month
- Golang client for querying SecurityTrails API data☆574Updated 2 years ago
- A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python☆199Updated 4 years ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆452Updated 3 years ago