Google-Dorks
Vulnerability exploits
A collection of tools and techniques for exploiting vulnerabilities in Google services
I'm uploading dorks here.
45 stars
3 watching
14 forks
last commit: over 9 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| Automates searching for vulnerabilities in databases and websites using predefined query patterns | 200 |
| A command-line tool to scan search results for vulnerabilities in webpages | 513 |
| Records disclosed OSS-Fuzz vulnerabilities and their impact on versions and commits | 138 |
| A collection of Proof Of Concept exploits and demonstrations | 17 |
| A comprehensive database of vulnerability and exploitation reports | 248 |
| A deliberately vulnerable Django web application showcasing common web application security threats | 230 |
| An in-depth exploration of browser exploitation techniques and vulnerability discovery | 446 |
| A collection of miscellaneous code snippets and experiments for learning and exploring various programming concepts and techniques | 57 |
| A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 |
| An analysis of an Android app vulnerable to oracle-based attacks | 42 |
| A collection of tips and tricks for using GDB-PEDA in exploit development | 16 |
| Automates the creation of vulnerable web applications for testing and security research purposes. | 84 |
| Exploits a known vulnerability in Oracle WebLogic to execute arbitrary code | 143 |
| Scans URLs from the wayback machine and tests GET parameters for SQL injection vulnerabilities. | 187 |
| Tools to scan npm packages for known vulnerabilities and outdated dependencies. | 223 |