Command-line tool to scan Google search results for vulnerabilities
☆544Mar 12, 2026Updated last week
Alternatives and similar repositories for dorkbot
Users that are interested in dorkbot are comparing it to the libraries listed below
Sorting:
- Advanced reconnaissance utility☆995Nov 20, 2023Updated 2 years ago
- Command-line Google dork tool. This is an early predecessor to dorkbot, which may be more useful: https://github.com/utiso/dorkbot☆153Jul 16, 2017Updated 8 years ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆350Feb 20, 2022Updated 4 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,558Aug 10, 2024Updated last year
- information gathering via dorks☆400Apr 19, 2022Updated 3 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆104Jun 1, 2018Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,450Nov 3, 2018Updated 7 years ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- XRay is a tool for recon, mapping and OSINT gathering from public networks.☆2,293Jul 10, 2024Updated last year
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- Email recon made fast and easy, with a framework to build on☆953Jan 12, 2023Updated 3 years ago
- Note: Going through a full re-write of the tooling so the current versions in the repo do not work!☆416May 18, 2020Updated 5 years ago
- Exploits and Security Tools Framework 2.0.1☆307Sep 18, 2022Updated 3 years ago
- Auto Scanning to SSL Vulnerability☆634Dec 12, 2020Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,237Nov 20, 2025Updated 4 months ago
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,560Nov 14, 2023Updated 2 years ago
- Aktaion: Open Source ML tool and data samples for Exploit and Phishing Research☆143Mar 26, 2019Updated 6 years ago
- Reconnaissance Swiss Army Knife☆2,022Jan 26, 2021Updated 5 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆263Nov 15, 2020Updated 5 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆629Oct 16, 2018Updated 7 years ago
- online port scan scraper☆1,121Aug 7, 2023Updated 2 years ago
- ☆2,321Dec 8, 2023Updated 2 years ago
- Mass exploitation tool in python☆205Dec 1, 2018Updated 7 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,722Oct 8, 2023Updated 2 years ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 3 months ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- massive SQL injection vulnerability scanner☆1,232Aug 14, 2018Updated 7 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,284Aug 18, 2025Updated 7 months ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆740Mar 5, 2024Updated 2 years ago
- Command line utility for searching and downloading exploits☆1,814Sep 10, 2025Updated 6 months ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆3,269Dec 1, 2025Updated 3 months ago