A typical search engine scanner that scans search engines with queries you provide to find vulnerable URLs.
Dorking is a technique used by news organizations, investigative agencies, security auditors, and savvy criminals to query various search engines to find hidden information on public websites and vulnerabilities exposed by public servers. Dorking is a way to use search engines to their fullest capacity to penetrate web-based services to depths that may not be visible at first glance.
pip3 install -r requirements.txt
$ python3 dorkscanner.py -h
usage: python3 dorkscanner.py [-h] [-q QUERY] [-e ENGINE] [-p PAGES] [-P PROCESSES] [-o OUTPUT] [-d DORK]
Example : python3 dorkscanner.py -e Bing -p 2 -P 1 -o test.txt -d dorks.txt
optional arguments:
-h, --help show this help message and exit
-q QUERY, --query QUERY
Specifies the query
-e ENGINE, --engine ENGINE
Specifies the search engine (Ask | Bing | WoW)
-p PAGES, --pages PAGES
Specifies the pages numbers (Default: 1)
-P PROCESSES, --processes PROCESSES
Specifies the number of processes (Default: 2)
-o OUTPUT, --output OUTPUT
Specifies the output file name (Default: /home/balgogan/GitHub/dorkscanner/pages/pages.txt)
-d DORK, --dork DORK Specifies the file containing the dorks (Default: /home/balgogan/GitHub/dorkscanner/dorks/dorks.txt)
Enter the search query:
Choose the search engine (Ask | Bing | WoW):