Dorkify perform Google Dork Search. Google dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer code that websites use. Google Dorking involves using advanced operators in the Google search engine to locate specific strings of text within search results such as finding specific versions of vulnerable Web applications. Users can utilize commands to get other specific search results.
Dorkify can :
INSTALLATION
Python 3.6 or higher is required
git clone https://github.com/hhhrrrttt222111/Dorkify.git
cd Dorkify
python3 -m pip install -r requirements.txt
USAGE
python3 dorkify.py –help
usage: dorkify.py [-h]
[–cli | –wp | –up | –cam |
–ftp | -v | -s SEARCH |
-b BOOK | -mu MUSIC | -m MAPS |
-w WEATHER | -i INFO | -d DEFINE |
-st STOCKS | –intitle INTITLE |
–inurl INURL | –site SITE]
optional arguments:
-h, –help show this help message and exit
–cli Run the Command Line version of Dorkify
–wp WordPress sites vulnerabilities
–up Find vulnerable Usernames and Passwords
–cam Find vulnerable CCTV cameras
–ftp Find open FTP Servers
-v, –version Version
-s SEARCH, –search SEARCH
Do a Google search
-b BOOK, –book BOOK Search for a book or author
-mu MUSIC, –music MUSIC
Search for songs or artists
-m MAPS, –maps MAPS Find maps of a city
-w WEATHER, –weather WEATHER
Check weather of a city
-i INFO, –info INFO Get Information
-d DEFINE, –define DEFINE
Define a term
-st STOCKS, –stocks STOCKS
Search for Stock of a company with Ticker value
–intitle INTITLE Search for a keywords in website title
–inurl INURL Search for a keywords in website URL
–site SITE Search for a Site
Run Dorkify
python3 dorkify.py –cli
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…
Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…
Introduction In the vast ocean of the internet, the most powerful tool you already have…
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…