DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficiently. The tool generates multiple Google Dork search queries for a given domain and opens them in new browser tabs to help identify potential vulnerabilities.
☆15Jan 25, 2026Updated 3 months ago
Alternatives and similar repositories for DorkTerm
Users that are interested in DorkTerm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- Google Dorks that can be used for penetration testing, security research, and information gathering.☆37Jan 25, 2026Updated 3 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 3 months ago
- Learn how to create and deploy an ESP high availability system using Kafka as the message broker.☆10Feb 20, 2020Updated 6 years ago
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆60Jan 25, 2026Updated 3 months ago
- Go bindings for naiveproxy.☆32Updated this week
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Slaying multi-language LLVM IR with obfuscation passes to achieve JIT execution☆132Dec 24, 2025Updated 4 months ago
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆54Jan 25, 2026Updated 3 months ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆40Jan 26, 2026Updated 3 months ago
- Network Security Config patcher for Android applications (APKs)☆13Sep 4, 2021Updated 4 years ago
- ☆26Sep 5, 2025Updated 7 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆105Jan 25, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repository is a comprehensive collection of SQL Injection Payloads designed for educational, research, and testing purposes. It incl…☆98Mar 31, 2025Updated last year
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆23Nov 24, 2025Updated 5 months ago
- This repository is a comprehensive collection of Cross-Site Scripting (XSS) Payloads designed for educational, research, and testing purp…☆28Mar 31, 2025Updated last year
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆12Jul 24, 2025Updated 9 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated 2 months ago
- Reverse engineered Amazon antibot system called AWSWAF. This also includes a FASTAPI to use it as an API. Used on sites like binance, hug…☆50Mar 14, 2026Updated last month
- RevEng.AI Radare2 Plugin☆17Jul 13, 2025Updated 9 months ago
- This Module Helps to Scan a Commit History of a Repo for Leakage of Secrets☆15Apr 26, 2025Updated last year
- ASR Configurator, Essentials and Atomic Testing☆105Apr 14, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A bytecode-engineering library for python 3.11☆11Jan 17, 2023Updated 3 years ago
- A small webserver vulnerable to insecure deserialization☆21Nov 30, 2017Updated 8 years ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆20May 20, 2025Updated 11 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆16Apr 8, 2026Updated 3 weeks ago
- A python script that look for hikvision vulnerable cams with a backdoor☆27Nov 23, 2023Updated 2 years ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).☆239Jan 25, 2026Updated 3 months ago
- A curated list of resources for genealogical research using open-source intelligence (OSINT).☆16Jan 10, 2025Updated last year
- 免费的指纹浏览器,Mask the most advanced open-source browser fingerprinting library,专门定制的141版本chromium指纹浏览器用 来过FingerPrintJS和其pro付费版本,支持HTTP密码代理☆35Dec 18, 2025Updated 4 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Prosopo.io solver☆21Feb 20, 2025Updated last year
- Govsky is an effort to catalog government presence on Bluesky by tracking when officially government domains sign up for the service.☆23Jan 9, 2026Updated 3 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Nov 29, 2022Updated 3 years ago
- This project provides a professional-grade solution for bypassing **Cloudflare Turnstile (5s Challenge)** and advanced fingerprinting sys…☆27Dec 19, 2025Updated 4 months ago
- ☆35Oct 19, 2025Updated 6 months ago
- Google Invisible ReCaptcha V3 Solve or Bypass Using PHP. Fully Automated.☆14Jun 7, 2024Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago