-
-
Notifications
You must be signed in to change notification settings - Fork 1
Home
Security researchers often need to perform reconnaissance on target domains to identify potential vulnerabilities. This process involves manually crafting and executing multiple Google Dork queries, which can be time-consuming and error-prone. Manually opening multiple search queries in a browser slows down the reconnaissance process and reduces efficiency.
DorkTerm is a web-based security tool designed to streamline the process of executing Google Dork queries. It automates the generation and execution of multiple Google Dork search queries for a given domain, opening each search result in a new browser tab. This allows security researchers to quickly access and analyze critical information about their target domain.
DorkTerm is a valuable tool for security researchers, bug bounty hunters, and penetration testers. It significantly improves the efficiency of Google Dork reconnaissance by automating repetitive tasks. The tool's terminal-inspired interface and preconfigured dorks make it easy to perform security audits on websites and discover sensitive information or potential vulnerabilities.
- Terminal-Inspired UI: Green and black terminal-style interface for a hacking aesthetic.
- 15 Predefined Google Dork Queries: Covers common security reconnaissance needs.
- Automation: Opens multiple tabs simultaneously with Google Dork queries for quick analysis.
- Responsive Design: Built with Bootstrap for compatibility across devices.
- Ease of Use: Simple input form and clear guidance on enabling popups.
- Visit Live DorkTerm: https://yogsec.github.io/DorkTerm/
-
Enter a Target Domain: Example:
example.com
. - Run the Tool: Click the Run button.
- View Results: Multiple tabs open with Google Dork queries related to the entered domain.
- Analyze: Inspect Google search results for potential vulnerabilities and sensitive data exposure.
The tool automates the following common Google Dork queries:
-
site:example.com inurl:login
– Login pages -
site:example.com inurl:admin
– Admin pages -
site:example.com ext:php
– PHP files -
site:example.com ext:sql
– SQL files -
site:example.com ext:xml
– XML files -
site:example.com ext:json
– JSON files -
site:example.com "index of"
– Directory listings -
site:example.com "password"
– Exposed passwords -
site:example.com "error"
– Error messages -
site:example.com intitle:"index of"
– Directory indexes -
site:example.com inurl:wp-content
– WordPress content -
site:example.com filetype:config
– Configuration files -
site:example.com ext:bak
– Backup files -
site:example.com ext:log
– Log files -
site:example.com ext:env
– Environment files