Command-line tool to scan Google search results for vulnerabilities
☆544Mar 31, 2026Updated last week
Alternatives and similar repositories for dorkbot
Users that are interested in dorkbot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced reconnaissance utility☆996Nov 20, 2023Updated 2 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆153Jul 16, 2017Updated 8 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆348Feb 20, 2022Updated 4 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,559Aug 10, 2024Updated last year
- information gathering via dorks☆400Apr 19, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,457Nov 3, 2018Updated 7 years ago
- Find exploits in local and online databases instantly☆1,808Sep 27, 2021Updated 4 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,296Jul 10, 2024Updated last year
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- Email recon made fast and easy, with a framework to build on☆958Jan 12, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Note: Going through a full re-write of the tooling so the current versions in the repo do not work!☆416May 18, 2020Updated 5 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- Auto Scanning to SSL Vulnerability☆634Dec 12, 2020Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,268Nov 20, 2025Updated 4 months ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,563Nov 14, 2023Updated 2 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 7 years ago
- Reconnaissance Swiss Army Knife☆2,029Jan 26, 2021Updated 5 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆266Nov 15, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆631Oct 16, 2018Updated 7 years ago
- online port scan scraper☆1,122Aug 7, 2023Updated 2 years ago
- Mass exploitation tool in python☆205Dec 1, 2018Updated 7 years ago
- ☆2,320Dec 8, 2023Updated 2 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,725Oct 8, 2023Updated 2 years ago
- Know the dangers of credential reuse attacks.☆2,103Dec 9, 2025Updated 4 months ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- massive SQL injection vulnerability scanner☆1,232Aug 14, 2018Updated 7 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,285Aug 18, 2025Updated 7 months ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆741Mar 5, 2024Updated 2 years ago
- Command line utility for searching and downloading exploits☆1,815Sep 10, 2025Updated 7 months ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆3,292Dec 1, 2025Updated 4 months ago