yousseflahouifi / dorkishView external linksLinks
Chrome extension tool for OSINT & Recon
☆57Mar 12, 2024Updated last year
Alternatives and similar repositories for dorkish
Users that are interested in dorkish are comparing it to the libraries listed below
Sorting:
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- ☆13Mar 1, 2024Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 10 months ago
- SpeedyTest☆17Jun 21, 2023Updated 2 years ago
- Intelligence and Reconnaissance Package/Bundle installer.☆28Nov 11, 2020Updated 5 years ago
- Phishing scams are more rampant than ever — and I wanted to do something about it. Over the last few weeks, I’ve been working on a proje…☆17Sep 8, 2025Updated 5 months ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆79Jul 13, 2024Updated last year
- Mobile Helper Framework (mhf) is a tool that automates the process of identifying the framework/technology used to create a mobile applic…☆27Dec 23, 2025Updated last month
- Kali Packerge Manager☆63Nov 1, 2023Updated 2 years ago
- OSTE WLA automate the process of analyzing web server logs with the Python Web Log Analyzer.☆44Jan 13, 2024Updated 2 years ago
- A fast and comprehensive tool for organizational network scanning☆134Apr 15, 2024Updated last year
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆41Oct 18, 2023Updated 2 years ago
- Web Path Finder☆60Nov 22, 2023Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Dec 7, 2019Updated 6 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆127Feb 18, 2024Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆15Jun 22, 2024Updated last year
- A Burp extension to Fuzz URLs for HTTP parser inconsistencies☆12Jan 9, 2024Updated 2 years ago
- Sample Random GitHub Repositories☆11Dec 27, 2025Updated last month
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆35Feb 20, 2024Updated last year
- CryptChat: Beyond Secure Messaging 🛡️☆71Nov 15, 2023Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆57Apr 16, 2024Updated last year
- Dump place details from Google Maps like phone,email,website,and reviews☆72Jun 3, 2025Updated 8 months ago
- Efficient DevSecOps☆47Jun 30, 2025Updated 7 months ago
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 8, 2026Updated last week
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated last year
- Automated authorization checks with multiple headers tool written in golang☆11Jan 3, 2024Updated 2 years ago
- Advanced test for proxy & waf☆13Feb 10, 2026Updated last week
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 2 years ago
- Automated OSINT on SwaggerHub☆243Jan 16, 2024Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Mar 15, 2024Updated last year
- ☆56Jan 22, 2025Updated last year
- A fast subdomain takeover tool☆85Nov 10, 2023Updated 2 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Jun 12, 2019Updated 6 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆57May 23, 2022Updated 3 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 7 months ago