Dorkify perform Google Dork Search. Google dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer code that websites use. Google Dorking involves using advanced operators in the Google search engine to locate specific strings of text within search results such as finding specific versions of vulnerable Web applications. Users can utilize commands to get other specific search results.
Dorkify can :
INSTALLATION
Python 3.6 or higher is required
git clone https://github.com/hhhrrrttt222111/Dorkify.git
cd Dorkify
python3 -m pip install -r requirements.txt
USAGE
python3 dorkify.py –help
usage: dorkify.py [-h]
[–cli | –wp | –up | –cam |
–ftp | -v | -s SEARCH |
-b BOOK | -mu MUSIC | -m MAPS |
-w WEATHER | -i INFO | -d DEFINE |
-st STOCKS | –intitle INTITLE |
–inurl INURL | –site SITE]
optional arguments:
-h, –help show this help message and exit
–cli Run the Command Line version of Dorkify
–wp WordPress sites vulnerabilities
–up Find vulnerable Usernames and Passwords
–cam Find vulnerable CCTV cameras
–ftp Find open FTP Servers
-v, –version Version
-s SEARCH, –search SEARCH
Do a Google search
-b BOOK, –book BOOK Search for a book or author
-mu MUSIC, –music MUSIC
Search for songs or artists
-m MAPS, –maps MAPS Find maps of a city
-w WEATHER, –weather WEATHER
Check weather of a city
-i INFO, –info INFO Get Information
-d DEFINE, –define DEFINE
Define a term
-st STOCKS, –stocks STOCKS
Search for Stock of a company with Ticker value
–intitle INTITLE Search for a keywords in website title
–inurl INURL Search for a keywords in website URL
–site SITE Search for a Site
Run Dorkify
python3 dorkify.py –cli
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…