Dorkify perform Google Dork Search. Google dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer code that websites use. Google Dorking involves using advanced operators in the Google search engine to locate specific strings of text within search results such as finding specific versions of vulnerable Web applications. Users can utilize commands to get other specific search results.
Dorkify can :
INSTALLATION
Python 3.6 or higher is required
git clone https://github.com/hhhrrrttt222111/Dorkify.git
cd Dorkify
python3 -m pip install -r requirements.txt
USAGE
python3 dorkify.py –help
usage: dorkify.py [-h]
[–cli | –wp | –up | –cam |
–ftp | -v | -s SEARCH |
-b BOOK | -mu MUSIC | -m MAPS |
-w WEATHER | -i INFO | -d DEFINE |
-st STOCKS | –intitle INTITLE |
–inurl INURL | –site SITE]
optional arguments:
-h, –help show this help message and exit
–cli Run the Command Line version of Dorkify
–wp WordPress sites vulnerabilities
–up Find vulnerable Usernames and Passwords
–cam Find vulnerable CCTV cameras
–ftp Find open FTP Servers
-v, –version Version
-s SEARCH, –search SEARCH
Do a Google search
-b BOOK, –book BOOK Search for a book or author
-mu MUSIC, –music MUSIC
Search for songs or artists
-m MAPS, –maps MAPS Find maps of a city
-w WEATHER, –weather WEATHER
Check weather of a city
-i INFO, –info INFO Get Information
-d DEFINE, –define DEFINE
Define a term
-st STOCKS, –stocks STOCKS
Search for Stock of a company with Ticker value
–intitle INTITLE Search for a keywords in website title
–inurl INURL Search for a keywords in website URL
–site SITE Search for a Site
Run Dorkify
python3 dorkify.py –cli
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…