-
-
Notifications
You must be signed in to change notification settings - Fork 2
Home
Security researchers often need to perform reconnaissance on target domains to identify potential vulnerabilities. This process involves manually crafting and executing multiple Google Dork queries, which can be time-consuming and error-prone. Manually opening multiple search queries in a browser slows down the reconnaissance process and reduces efficiency.
DorkTerm is a web-based security tool designed to streamline the process of executing Google Dork queries. It automates the generation and execution of multiple Google Dork search queries for a given domain, opening each search result in a new browser tab. This allows security researchers to quickly access and analyze critical information about their target domain.
DorkTerm is a valuable tool for security researchers, bug bounty hunters, and penetration testers. It significantly improves the efficiency of Google Dork reconnaissance by automating repetitive tasks. The tool's terminal-inspired interface and preconfigured dorks make it easy to perform security audits on websites and discover sensitive information or potential vulnerabilities.
- Terminal-Inspired UI: Green and black terminal-style interface for a hacking aesthetic.
- 15 Predefined Google Dork Queries: Covers common security reconnaissance needs.
- Automation: Opens multiple tabs simultaneously with Google Dork queries for quick analysis.
- Responsive Design: Built with Bootstrap for compatibility across devices.
- Ease of Use: Simple input form and clear guidance on enabling popups.
- Visit Live DorkTerm: https://yogsec.github.io/DorkTerm/
-
Enter a Target Domain: Example:
example.com. - Run the Tool: Click the Run button.
- View Results: Multiple tabs open with Google Dork queries related to the entered domain.
- Analyze: Inspect Google search results for potential vulnerabilities and sensitive data exposure.
The tool automates the following common Google Dork queries:
-
site:example.com inurl:login– Login pages -
site:example.com inurl:admin– Admin pages -
site:example.com ext:php– PHP files -
site:example.com ext:sql– SQL files -
site:example.com ext:xml– XML files -
site:example.com ext:json– JSON files -
site:example.com "index of"– Directory listings -
site:example.com "password"– Exposed passwords -
site:example.com "error"– Error messages -
site:example.com intitle:"index of"– Directory indexes -
site:example.com inurl:wp-content– WordPress content -
site:example.com filetype:config– Configuration files -
site:example.com ext:bak– Backup files -
site:example.com ext:log– Log files -
site:example.com ext:env– Environment files