15 skills found
opsdisk / Pagodopagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching
1N3 / GoohakAutomatically Launch Google Hacking Queries Against A Target Domain
Ishanoshada / GDorksGoogle Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories ) + Web App
readloud / Google Hacking DatabaseThe GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.
R4yGM / DorkscoutDorkScout - Golang tool to automate google dork scan against the entiere internet or specific targets
ResearchandDestroy / DorXNGNext Generation DorX. Built by Dorks, for Dorks. 🤓
TrixSec / DorkHubDorkHub is the security researcher's companion. It’s a comprehensive repository of Google dorks collected in one place, specifically designed to aid in security assessments and ethical hacking.
SalehLardhi / Google Dorks ToolkitGoogleDorks Toolkit is a powerful automated tool for google dorks, designed for pentration tester, ethical hackers and bug hunters to detect harmful security vulnerabilities using Google Dorks techniques. It has methods to bypass google captcha and search in a list of any possible program in wild.
zomzam-aar / XGSPYTHON CODE TO SEARCH BY DORK ON (.onion) WEBSITES , NORMAL WEBSITES AND LEARN HOW DORK WORK.
0arifurrahman0 / Google Hacking Database CheatsheetGoogle Hacking Database (GHDB) Cheatsheet
Ishanoshada / GDorks WebGDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on GitHub. With asynchronous requests and GitHub API integration, users can select categories and specify how many dorks they want to fetch, all through an intuitive web interface.
sostoli / DorkerGoogle Dorker with GHDB payloads
ObayAlbadri / WebshellDorksList of Google dorks for common web shells.
VolkanSah / The Extractor.pyThe Extractor is a Python script that extracts Google dorks from the official Google Hacking Database (GHDB) XML file and saves them in a CSV file. The script only extracts dorks that contain the "inurl:" operator because they are more specific and useful for targeted web scanning.
em-corp / F0xRun dorks smartly, not blindly, to make clear and faster decision to prevent info leakage