Google-Dorks
Vulnerability exploits
A collection of tools and techniques for exploiting vulnerabilities in Google services
I'm uploading dorks here.
45 stars
3 watching
14 forks
last commit: almost 10 years ago
Linked from 1 awesome list
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Automates searching for vulnerabilities in databases and websites using predefined query patterns | 200 |
| | A command-line tool to scan search results for vulnerabilities in webpages | 513 |
| | Records disclosed OSS-Fuzz vulnerabilities and their impact on versions and commits | 138 |
| | A collection of Proof Of Concept exploits and demonstrations | 17 |
| | A comprehensive database of vulnerability and exploitation reports | 248 |
| | A deliberately vulnerable Django web application showcasing common web application security threats | 230 |
| | An in-depth exploration of browser exploitation techniques and vulnerability discovery | 446 |
| | A collection of miscellaneous code snippets and experiments for learning and exploring various programming concepts and techniques | 57 |
| | A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 |
| | An analysis of an Android app vulnerable to oracle-based attacks | 42 |
| | A collection of tips and tricks for using GDB-PEDA in exploit development | 16 |
| | Automates the creation of vulnerable web applications for testing and security research purposes. | 84 |
| | Exploits a known vulnerability in Oracle WebLogic to execute arbitrary code | 143 |
| | Scans URLs from the wayback machine and tests GET parameters for SQL injection vulnerabilities. | 187 |
| | Tools to scan npm packages for known vulnerabilities and outdated dependencies. | 223 |