Dorkify perform Google Dork Search. Google dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer code that websites use. Google Dorking involves using advanced operators in the Google search engine to locate specific strings of text within search results such as finding specific versions of vulnerable Web applications. Users can utilize commands to get other specific search results.
Dorkify can :
INSTALLATION
Python 3.6 or higher is required
git clone https://github.com/hhhrrrttt222111/Dorkify.git
cd Dorkify
python3 -m pip install -r requirements.txt
USAGE
python3 dorkify.py –help
usage: dorkify.py [-h]
[–cli | –wp | –up | –cam |
–ftp | -v | -s SEARCH |
-b BOOK | -mu MUSIC | -m MAPS |
-w WEATHER | -i INFO | -d DEFINE |
-st STOCKS | –intitle INTITLE |
–inurl INURL | –site SITE]
optional arguments:
-h, –help show this help message and exit
–cli Run the Command Line version of Dorkify
–wp WordPress sites vulnerabilities
–up Find vulnerable Usernames and Passwords
–cam Find vulnerable CCTV cameras
–ftp Find open FTP Servers
-v, –version Version
-s SEARCH, –search SEARCH
Do a Google search
-b BOOK, –book BOOK Search for a book or author
-mu MUSIC, –music MUSIC
Search for songs or artists
-m MAPS, –maps MAPS Find maps of a city
-w WEATHER, –weather WEATHER
Check weather of a city
-i INFO, –info INFO Get Information
-d DEFINE, –define DEFINE
Define a term
-st STOCKS, –stocks STOCKS
Search for Stock of a company with Ticker value
–intitle INTITLE Search for a keywords in website title
–inurl INURL Search for a keywords in website URL
–site SITE Search for a Site
Run Dorkify
python3 dorkify.py –cli
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…