pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching
翻译 - pagodo(Passive Google Dork)-自动化Google Hacking数据库抓取和搜索
Automatically Launch Google Hacking Queries Against A Target Domain
Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories ) + Web App
#网络爬虫#DorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets
Next Generation DorX. Built by Dorks, for Dorks. 🤓
PYTHON CODE TO SEARCH BY DORK ON (.onion) WEBSITES , NORMAL WEBSITES AND LEARN HOW DORK WORK.
#网络爬虫#GoogleDorks Toolkit is a powerful automated tool for google dorks, designed for pentration tester, ethical hackers and bug hunters to detect harmful security vulnerabilities using Google Dorks techniq...
DorkHub is the security researcher's companion. It’s a comprehensive repository of Google dorks collected in one place, specifically designed to aid in security assessments and ethical hacking.
The Extractor is a Python script that extracts Google dorks from the official Google Hacking Database (GHDB) XML file and saves them in a CSV file. The script only extracts dorks that contain the "inu...
#网络爬虫#Run dorks smartly, not blindly, to make clear and faster decision to prevent info leakage
Query GHDB for dorks and save a clean response to a file.
Tool that accepts a GoogleDork string and performs a set of actions.
GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on GitHub. With asynchronous requests and GitHub API integration, us...
Webdork is a command-line application designed for targeted web dorking. It allows users to search specific domains and subdomains, as well as more general targets such as usernames or keywords, to un...
Tool for effectively searching on google and get relevant results.
GHDB - ShellCode and Exploits Script Yang Sering Saya Pakai. Semoga Bermanfaat dan Membantu Anda. Happy Hacking ;)
A list of Google Dorks for Bug Bounty, Web Application Security, and Pentesting