☆18Jun 28, 2020Updated 5 years ago
Alternatives and similar repositories for githubdorks
Users that are interested in githubdorks are comparing it to the libraries listed below
Sorting:
- Some files for bruteforcing certain things.☆25Jul 12, 2021Updated 4 years ago
- ☆11Oct 31, 2021Updated 4 years ago
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- This is a comprehensive Subdomain Enumeration Guide that traces back to my GitBook.☆31Mar 19, 2025Updated last year
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- Default plugins for Jaeles Scanner☆35Nov 5, 2020Updated 5 years ago
- OWASP Smart Contract Securty Verification Standard☆17Aug 20, 2025Updated 7 months ago
- Grey Haven's centralized repository for Claude Code agents, commands, and configs☆20Feb 17, 2026Updated last month
- ☆14Jul 1, 2021Updated 4 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Jul 26, 2020Updated 5 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- Hackthebox automation scripts and writeups.☆22Jan 27, 2020Updated 6 years ago
- This page should help you with the recon for security issues.☆20Oct 14, 2022Updated 3 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- Gitosint is a tool for reconnaissance of the Git services and extracting valuable metadata from commits.☆14Aug 22, 2021Updated 4 years ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Feb 12, 2022Updated 4 years ago
- Secret Keywords patterns - aggregated from different sources.☆13Mar 15, 2021Updated 5 years ago
- Generate social media preview images (Open Graph) and configure all meta tags for optimal sharing on Twitter/X, LinkedIn, Facebook, Slack…☆58Jan 27, 2026Updated last month
- ☆53Aug 27, 2020Updated 5 years ago
- https://english.ncsc.nl/contact/reporting-a-vulnerability-cvd☆21Feb 17, 2022Updated 4 years ago
- ☆16May 3, 2021Updated 4 years ago
- Virtual Fitting Room for ecommerce websites☆15Dec 24, 2024Updated last year
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆21Feb 10, 2026Updated last month
- delosNmap | Nmap Script☆38Jan 15, 2023Updated 3 years ago
- ☆30Mar 12, 2026Updated last week
- OWASP Smart Contract Security (SCS) Project☆42Feb 9, 2026Updated last month
- Google Dorks and keywords for bug hunters.☆15Aug 16, 2021Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Script that download 37+ open source nuclei templates☆45Sep 2, 2022Updated 3 years ago
- Harness the Power of AI for all your reporting needs.☆28Apr 17, 2023Updated 2 years ago
- Insecure Vulnerable Android Application that helps to learn hacing and securing apps☆21Oct 4, 2015Updated 10 years ago
- A standalone collection of widely used technologies with default credentials enabled, which can be utilized for establishing an initial f…☆20Jun 1, 2024Updated last year
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- This repository includes some r2frida scripts to monitor iOS and Android Mobile apps.☆11Dec 21, 2021Updated 4 years ago
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago