DorkX : Pipe Different Tools With Google Dork Scanner

DorkX pipe different tools with google dork Scanner.

Install

zoid@MSI ~/dorkX> git clone https://github.com/ethicalhackingplayground/dorkX
zoid@MSI ~/dorkX> cd dorkX
zoid@MSI ~/dorkX> go build dorkx.go
zoid@MSI ~/dorkX> go build corsx.go
zoid@MSI ~/dorkX> go build csrfx.go
zoid@MSI ~/dorkX> go build zin.go

Usage

  • Blind XSS

zoid@MSI ~/dorkX> ./dorkX -dorks dorks.txt -concurrency 100 | dalfox pipe -b ‘”>’

  • XSS

zoid@MSI ~/dorkX> ./dorkx -dorks dorks.txt | dalfox pipe
zoid@MSI ~/dorkX> ./dorkx -dork “inurl:index.php?id” | dalfox pipe

  • Cors

zoid@MSI ~/dorkX> ./dorkx -dorks dorks.txt | ./corsx
zoid@MSI ~/dorkX> ./dorkx -dork “inurl:index.php?id” | ./corsx

  • CSRF

zoid@MSI ~/dorkX> ./dorkx -dorks dorks.txt | ./csrfx
zoid@MSI ~/dorkX> ./dorkx -dork “inurl:index.php?id” | ./csrfx

  • Payload Injection

zoid@MSI ~/dorkX> ./dorkx -dorks dorks.txt | ./zin -pL
zoid@MSI ~/dorkX> ./dorkx -dork “inurl:index.php?id” |./zin -p

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 day ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago