DorkX pipe different tools with google dork Scanner.
Install
zoid@MSI ~/dorkX> git clone https://github.com/ethicalhackingplayground/dorkX
zoid@MSI ~/dorkX> cd dorkX
zoid@MSI ~/dorkX> go build dorkx.go
zoid@MSI ~/dorkX> go build corsx.go
zoid@MSI ~/dorkX> go build csrfx.go
zoid@MSI ~/dorkX> go build zin.go
Usage
zoid@MSI ~/dorkX> ./dorkX -dorks dorks.txt -concurrency 100 | dalfox pipe -b ‘”>’
zoid@MSI ~/dorkX> ./dorkx -dorks dorks.txt | dalfox pipe
zoid@MSI ~/dorkX> ./dorkx -dork “inurl:index.php?id” | dalfox pipe
zoid@MSI ~/dorkX> ./dorkx -dorks dorks.txt | ./corsx
zoid@MSI ~/dorkX> ./dorkx -dork “inurl:index.php?id” | ./corsx
zoid@MSI ~/dorkX> ./dorkx -dorks dorks.txt | ./csrfx
zoid@MSI ~/dorkX> ./dorkx -dork “inurl:index.php?id” | ./csrfx
zoid@MSI ~/dorkX> ./dorkx -dorks dorks.txt | ./zin -pL
zoid@MSI ~/dorkX> ./dorkx -dork “inurl:index.php?id” |./zin -p
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…