Skip to content
YogSec edited this page Mar 2, 2025 · 2 revisions

DorkTerm Wiki

Problem

Security researchers often need to perform reconnaissance on target domains to identify potential vulnerabilities. This process involves manually crafting and executing multiple Google Dork queries, which can be time-consuming and error-prone. Manually opening multiple search queries in a browser slows down the reconnaissance process and reduces efficiency.

Solution

DorkTerm is a web-based security tool designed to streamline the process of executing Google Dork queries. It automates the generation and execution of multiple Google Dork search queries for a given domain, opening each search result in a new browser tab. This allows security researchers to quickly access and analyze critical information about their target domain.

Importance

DorkTerm is a valuable tool for security researchers, bug bounty hunters, and penetration testers. It significantly improves the efficiency of Google Dork reconnaissance by automating repetitive tasks. The tool's terminal-inspired interface and preconfigured dorks make it easy to perform security audits on websites and discover sensitive information or potential vulnerabilities.

Features

  • Terminal-Inspired UI: Green and black terminal-style interface for a hacking aesthetic.
  • 15 Predefined Google Dork Queries: Covers common security reconnaissance needs.
  • Automation: Opens multiple tabs simultaneously with Google Dork queries for quick analysis.
  • Responsive Design: Built with Bootstrap for compatibility across devices.
  • Ease of Use: Simple input form and clear guidance on enabling popups.

How to Use

  1. Visit Live DorkTerm: https://yogsec.github.io/DorkTerm/
  2. Enter a Target Domain: Example: example.com.
  3. Run the Tool: Click the Run button.
  4. View Results: Multiple tabs open with Google Dork queries related to the entered domain.
  5. Analyze: Inspect Google search results for potential vulnerabilities and sensitive data exposure.

Google Dork Queries Used

The tool automates the following common Google Dork queries:

  • site:example.com inurl:login – Login pages
  • site:example.com inurl:admin – Admin pages
  • site:example.com ext:php – PHP files
  • site:example.com ext:sql – SQL files
  • site:example.com ext:xml – XML files
  • site:example.com ext:json – JSON files
  • site:example.com "index of" – Directory listings
  • site:example.com "password" – Exposed passwords
  • site:example.com "error" – Error messages
  • site:example.com intitle:"index of" – Directory indexes
  • site:example.com inurl:wp-content – WordPress content
  • site:example.com filetype:config – Configuration files
  • site:example.com ext:bak – Backup files
  • site:example.com ext:log – Log files
  • site:example.com ext:env – Environment files
Clone this wiki locally