Dorkify perform Google Dork Search. Google dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer code that websites use. Google Dorking involves using advanced operators in the Google search engine to locate specific strings of text within search results such as finding specific versions of vulnerable Web applications. Users can utilize commands to get other specific search results.
Dorkify can :
INSTALLATION
Python 3.6 or higher is required
git clone https://github.com/hhhrrrttt222111/Dorkify.git
cd Dorkify
python3 -m pip install -r requirements.txt
USAGE
python3 dorkify.py –help
usage: dorkify.py [-h]
[–cli | –wp | –up | –cam |
–ftp | -v | -s SEARCH |
-b BOOK | -mu MUSIC | -m MAPS |
-w WEATHER | -i INFO | -d DEFINE |
-st STOCKS | –intitle INTITLE |
–inurl INURL | –site SITE]
optional arguments:
-h, –help show this help message and exit
–cli Run the Command Line version of Dorkify
–wp WordPress sites vulnerabilities
–up Find vulnerable Usernames and Passwords
–cam Find vulnerable CCTV cameras
–ftp Find open FTP Servers
-v, –version Version
-s SEARCH, –search SEARCH
Do a Google search
-b BOOK, –book BOOK Search for a book or author
-mu MUSIC, –music MUSIC
Search for songs or artists
-m MAPS, –maps MAPS Find maps of a city
-w WEATHER, –weather WEATHER
Check weather of a city
-i INFO, –info INFO Get Information
-d DEFINE, –define DEFINE
Define a term
-st STOCKS, –stocks STOCKS
Search for Stock of a company with Ticker value
–intitle INTITLE Search for a keywords in website title
–inurl INURL Search for a keywords in website URL
–site SITE Search for a Site
Run Dorkify
python3 dorkify.py –cli
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…