SXDork : A Tool That Utilizes The Technique Of Google Dorking To Search For Specific Information On The Internet

0

SXDork is a powerful tool that utilizes the technique of google dorking to search for specific information on the internet. Google dorking is a method of using advanced search operators and keywords to uncover sensitive information that is publicly available on the internet. SXDork offers a wide range of options to search for different types of dorks, such as...

CVE-Vulnerability-Information-Downloader : Downloads Information From NIST (CVSS), First.Org (EPSS), And CISA (Exploited Vulnerabilities) And Combines Them Into One List

0

CVE-Vulnerability-Information-Downloader downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from vulnerability scanners like OpenVAS can be enriched with this information to prioritize remediation. The repository also contains a PowerBI template to show how such a dashboard can be created. CVE Vulnerability Information Downloader Common Vulnerability Scoring System (CVSS) is a free...

Gmailc2 : A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic Restrictions

0

Gmailc2 is a Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions. Note: This RAT communicates Via Gmail SMTP (or u can use any other smtps as well) but Gmail SMTP is valid because most of the companies block unknown traffic so gmail traffic is valid and allowed...

Tracgram : Use Instagram location features to track an account

0

Trackgram Use Instagram location features to track an account. Usage At this moment the usage of Trackgram is extremly simple: 1. Download this repository 2. Go through the instalation steps 3. Change the parameters in the tracgram main method directly: + Mandatory: - NICKNAME: your username on Instagram ...

Probable_Subdomains : Subdomains Analysis And Generation Tool

0

Probable_Subdomains is a Subdomains Analysis And Generation Tool Online tool: https://weakpass.com/generate/domains TL;DR During bug bounties, penetrations tests, red teams exercises, and other great activities, there is always a room when you need to launch amass, subfinder, sublister, or any other tool to find subdomains you can use to break through - like test.google.com, dev.admin.paypal.com or staging.ceo.twitter.com. Within this repository, you will...

Where to get knowledge and information about the World of Warcraft for beginners

0

Despite the fact that World of Warcraft has more than 10 years of history of active development, the project still remains difficult for players to master, who are just arriving on the servers of Azeroth. WoW, of course, has a built-in training system from developers and a phased development with an introduction to the main mechanics, quests, raids, professions and...

Reverseip_Py : Domain Parser For IPAddress.com Reverse IP Lookup

0

Reverseip_py is a Domain parser for IPAddress.com Reverse IP Lookup. Written in Python 3. What is Reverse IP? Reverse IP refers to the process of looking up all the domain names that are hosted on a particular IP address. This can be useful for a variety of reasons, such as identifying all the websites that are hosted on a shared hosting...

ThreatHound : Tool That Help You On Your IR & Threat Hunting And CA

0

ThreatHound is a tool will help you on your IR & Threat Hunting & CA. just drop your event log file and anlayze the results. New Release Features: support windows (ThreatHound.exe) C for Linux based new version available in C also now you can save results in json file or print on screen it as you want by arg 'print' "'yes' to print the...

Faraday : Open Source Vulnerability Management Platform

0

Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation efforts. With Faraday, you may focus on discovering vulnerabilities while we help you with the rest. Just use it in your terminal and get your work organized on the run. Faraday was made to let you take advantage of...

Upload_Bypass_Carnage : File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!

0

Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques! POC video: https://www.youtube.com/watch?v=quFoDysbDto&ab_channel=SagivMichael Installation: pip3 install -r requirements.txt Usage: upload_bypass.py Options: -h, --help show this help message and exit -u URL, --url=URL Supply the login page, for example: -u http://192.168.98.200/login.php' -s , --success Success message when upload an image, example: -s 'Image uploaded successfully.' -e , --extension Provide server backend extension, for example: --extension php...