Dorker is a Python tool that generates Google, Shodan, GitHub, GitLab etc. dorking commands for web application penetration testing.
- Generates Google, Shodan, GitHub, GitLab & many more dorking commands
- Allows users to customize the search parameters
- Provides relevant and targeted results for web application penetration testing
- Clone the repository:
git clone https://github.com/nerrorsec/Dorker.git
- Navigate to the repository directory:
cd Dorker
- Install the required libraries:
pip install -r requirements.txt
- Run the tool:
python3 dorker.py -t google.com -o google_out
python3 dorker.py -l list.txt -o lists
- That's it
Here are some examples of the commands generated by Google Dorker:
site:example.com intext:"admin login"
http.title:"admin panel" country:"US"
filename:.env path:config
filename:database.yml path:config
Contributions are welcome and encouraged! If you find any bugs or issues, please open a new issue. If you would like to contribute to the project, please fork the repository and submit a pull request.
Dorker is released under the MIT License.