This comprehensive security toolkit includes six powerful tools designed for penetration testers, security researchers, and red team operators. Each tool is optimized for efficiency and provides specialized capabilities for different phases of security assessment.
Advanced target discovery and information gathering capabilities including Google dorking and historical data analysis.
Automated identification of potential security weaknesses across multiple vectors.
Specialized tools for retrieving sensitive information from web applications and services.
Advanced techniques for service identification and target profiling.
Automated Google search dorking using SerpAPI for comprehensive information gathering.
# Clone repository
git clone https://github.com/yourusername/security-tools.git
cd security-tools/google-dorking
# Install dependencies
pip install -r requirements.txt
# Get API key from https://serpapi.com/
# Add to script or environment variables
# Single target mode
python3 dork_tool.py
# Bulk mode with target file
python3 dork_tool.py targets.txt
Extract historical URLs from Wayback Machine for comprehensive target analysis.
# Ensure you have required utilities
sudo apt install curl grep sed
# Make script executable
chmod +x wayback_extractor.sh
# Interactive mode
./wayback_extractor.sh
# With target file
./wayback_extractor.sh targets.txt
Recursive website scraping with sensitive data detection capabilities.
# Install required packages
sudo apt install wget grep
# Download user agents file (optional)
wget https://example.com/user_agents.txt
# Run with default settings
./web_scanner.sh
# Custom settings
./web_scanner.sh -d 3 -t "php,html" targets.txt
Unified CVE/exploit lookup across multiple databases.
# Install required tools
sudo apt install exploitdb metasploit-framework jq
# Update databases
searchsploit -u
msfupdate
# Search for Apache 2.4.49 vulnerabilities
./vuln_search.sh Apache 2.4.49
# Output to JSON file
./vuln_search.sh Nginx 1.18.0 -o nginx_vulns.json
Advanced web reconnaissance with multiple scanning techniques.
# Install dependencies
sudo apt install wget grep sed
# Make script executable
chmod +x enhanced_recon.sh
# Interactive mode
./enhanced_recon.sh
# With custom settings
./enhanced_recon.sh -d 4 -w 1.5 targets.txt
Favicon-based fingerprinting with multiple hash algorithms.
# Install Python dependencies
pip install requests beautifulsoup4 mmh3 colorama
# Clone repository
git clone https://github.com/yourusername/favicon-analyzer.git
# Single domain analysis
python3 favicon_analyzer.py example.com
# Bulk analysis with JSON output
python3 favicon_analyzer.py domains.txt -o results.json
These tools can be chained together for comprehensive security assessments:
security-tools/
├── google-dorking/ # Tool 01
│ ├── dork_tool.py
│ ├── requirements.txt
│ └── README.md
├── wayback-extractor/ # Tool 02
│ ├── wayback_extractor.sh
│ └── README.md
├── web-scanner/ # Tool 03
│ ├── web_scanner.sh
│ ├── user_agents.txt
│ └── README.md
├── vuln-search/ # Tool 04
│ ├── vuln_search.sh
│ └── README.md
├── enhanced-recon/ # Tool 05
│ ├── enhanced_recon.sh
│ └── README.md
├── favicon-analyzer/ # Tool 06
│ ├── favicon_analyzer.py
│ ├── requirements.txt
│ └── README.md
├── LICENSE
└── README.md # Main project documentation