yogsec / DorkTerm
DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficiently. The tool generates multiple Google Dork search queries for a given domain and opens them in new browser tabs to help identify potential vulnerabilities.
☆12Updated this week
Alternatives and similar repositories for DorkTerm:
Users that are interested in DorkTerm are comparing it to the libraries listed below
- Check for the existence of an email on Google platforms☆13Updated last year
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆18Updated 7 months ago
- Enumeration & fingerprint tool☆24Updated last year
- Subdomains scanner Spider☆13Updated last year
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆9Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆24Updated 8 months ago
- ☆13Updated last year
- Advanced test for proxy & waf☆13Updated 6 months ago
- A C# Tool to gather information about email breaches☆14Updated last year
- Powershell Scripts for Blue Team members☆12Updated last year
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- subdog is a subdomain enumeration tools, this tool collect number of different sources to create a list of root subdomains☆15Updated 2 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated 5 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- this nuclei template finds back up files☆19Updated 4 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆24Updated 9 months ago
- Burp extension used to snip any header from all the requests.☆22Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated 8 months ago
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆13Updated 11 months ago
- Terminal based fake identity generator.☆26Updated last year
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆12Updated 5 months ago
- This repository contains the best fuzzing wordlist files☆29Updated 4 months ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆19Updated 6 months ago
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆12Updated 3 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆17Updated 6 months ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆14Updated 2 months ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- Slides and videos from talks given at cons☆13Updated 9 months ago