DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficiently. The tool generates multiple Google Dork search queries for a given domain and opens them in new browser tabs to help identify potential vulnerabilities.
☆15Jan 25, 2026Updated 2 months ago
Alternatives and similar repositories for DorkTerm
Users that are interested in DorkTerm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆19Mar 6, 2025Updated last year
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 2 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 2 months ago
- Learn how to create and deploy an ESP high availability system using Kafka as the message broker.☆10Feb 20, 2020Updated 6 years ago
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆58Jan 25, 2026Updated 2 months ago
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆132Dec 24, 2025Updated 3 months ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Network Security Config patcher for Android applications (APKs)☆13Sep 4, 2021Updated 4 years ago
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆53Jan 25, 2026Updated 2 months ago
- This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It incl…☆85Mar 31, 2025Updated last year
- This repository is a comprehensive collection of Cross-Site Scripting (XSS) Payloads designed for educational, research, and testing purp…☆26Mar 31, 2025Updated last year
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆40Jan 26, 2026Updated 2 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆101Jan 25, 2026Updated 2 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆25Sep 5, 2025Updated 7 months ago
- 免费的指纹浏览器,Mask the most advanced open-source browser fingerprinting library,专门定制的141版本chromium指纹浏览器用来过FingerPrintJS和其pro付费版本,支持HTTP密码代理☆26Dec 18, 2025Updated 3 months ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆22Nov 24, 2025Updated 4 months ago
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆12Jul 24, 2025Updated 8 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- RevEng.AI Radare2 Plugin☆17Jul 13, 2025Updated 8 months ago
- A bytecode-engineering library for python 3.11☆11Jan 17, 2023Updated 3 years ago
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated 11 months ago
- ASR Configurator, Essentials and Atomic Testing☆105Apr 14, 2025Updated 11 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆19May 20, 2025Updated 10 months ago
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- Prosopo.io solver☆21Feb 20, 2025Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆238Jan 25, 2026Updated 2 months ago
- A python script that look for hikvision vulnerable cams with a backdoor☆28Nov 23, 2023Updated 2 years ago
- A curated list of resources for genealogical research using open-source intelligence (OSINT).☆16Jan 10, 2025Updated last year
- This project provides a professional-grade solution for bypassing **Cloudflare Turnstile (5s Challenge)** and advanced fingerprinting sys…☆27Dec 19, 2025Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆36Oct 19, 2025Updated 5 months ago
- Google Invisible ReCaptcha V3 Solve or Bypass Using PHP. Fully Automated.☆13Jun 7, 2024Updated last year
- 🫂 A toolkit that adds extra functionality to niri☆32Jan 11, 2026Updated 3 months ago
- Govsky is an effort to catalog government presence on Bluesky by tracking when officially government domains sign up for the service.☆23Jan 9, 2026Updated 3 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆32Nov 29, 2022Updated 3 years ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- Latest Evilginx Modification + Custom Features such as Telegram WebHook, latest anti detection, server side query to identify and bypass …☆12Apr 30, 2024Updated last year