Google Dorks that can be used for penetration testing, security research, and information gathering.
☆37Jan 25, 2026Updated 3 months ago
Alternatives and similar repositories for Pen-Testing-Google-Dorks
Users that are interested in Pen-Testing-Google-Dorks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 3 months ago
- Automated way to extract juicy info with subfinder and waybackurls☆41Aug 24, 2025Updated 8 months ago
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated 3 months ago
- An advanced XSS vulnerability scanner.☆11Feb 24, 2025Updated last year
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆20Mar 6, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- CrlfiX☆22Jan 30, 2025Updated last year
- The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers …☆54Jan 25, 2026Updated 3 months ago
- ☆24Mar 22, 2025Updated last year
- ☆102Apr 4, 2025Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆235Mar 29, 2025Updated last year
- Lists various tools used in hardware hacking.☆34Jan 25, 2026Updated 3 months ago
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆60Jan 25, 2026Updated 3 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their s…☆60Jan 25, 2026Updated 3 months ago
- Automate Recon XSS Bug Bounty☆183Mar 9, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆90Jan 25, 2026Updated 3 months ago
- ☆12Mar 8, 2025Updated last year
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Sep 25, 2024Updated last year
- ZeusLeak is a browser extension that automatically detects leaked secrets and credentials in code while browsing.☆47Mar 8, 2025Updated last year
- ☆19Jan 13, 2025Updated last year
- CVE-2025-4123 - Grafana Tool☆32Jun 4, 2025Updated 10 months ago
- ☆20Aug 23, 2025Updated 8 months ago
- Unauthenticated RCE on cups-browsed (exploit and nuclei template)