Skip to content

WEB-Dorker is a futuristic reconnaissance framework that transforms classic Google dorking into a multi-engine intelligence weapon — precise, automated, and professional.

License

Notifications You must be signed in to change notification settings

CYBER-MRINAL/WEB-Dorker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 

Repository files navigation

🌌 WEB-Dorker

Advanced Multi-Engine Dorking Framework


🌀 Introduction

WEB-Dorker is not just another search script – it’s a futuristic reconnaissance companion.
Crafted for ethical cybersecurity research, this tool empowers researchers, bug bounty hunters, and penetration testers to uncover digital exposure using multi-engine dorking intelligence.

It merges classic hacker-style dorking with a professional workflow, ensuring logs, automation, and customizable search patterns — all wrapped in a minimal yet powerful design.


✨ Core Capabilities

🚀 Multi-Engine Search → Google • Bing • DuckDuckGo
📂 60 Verified Templates → 6 Security Categories × 10 Queries Each
🛠 Custom Dork Mode → Build and run your own intelligence queries
🗂 Session Logging → TXT • JSONL • CSV (organized, timestamped)
📜 History Mode → Revisit & relaunch past sessions instantly
🖥 Classic Hacker Display → Dual-column query menu with color-coded navigation


🔎 Categories

1️⃣ Directory & Index Exposure
2️⃣ Login Pages
3️⃣ Sensitive Files
4️⃣ Vulnerable Applications
5️⃣ Cloud & Credential Leaks
6️⃣ Cameras & IoT Devices


⚡ Installation

Clone the repo:

git clone https://github.com/CYBER-MRINAL/WEB-Dorker.git
cd WEB-Dorker

Install requirements:

pip3 install colorama

🛡 Usage

Run the tool:

python3 web-dorker.py

Inside the tool:

  • H → Browse history
  • C → Enter custom dork mode
  • Q → Quit gracefully

🔮 Example workflow:

 Enter (domain) or (option):> example.com
 Choose search engine: [1] Google  [2] Bing  [3] DuckDuckGo
 Choose categories:> 1,5
 Dork selection:> all

Snapshot of the tool


image

📊 Logs

Every session is preserved inside dork_logs/ with rich formats:

  • TXT → Human-readable reference
  • JSONL → Structured machine logs
  • CSV → Tabular for reports & analysis

⚖️ Ethical Disclaimer

🛑 This project is created for defensive security research only. Running WEB-Dorcker against systems you do not own or manage may be illegal. The author (CYBER-MRINAL) is not liable for misuse. Always follow responsible disclosure and ethical hacking principles.


🧭 Roadmap (Next Evolution)

  • ⏳ AI-assisted query suggestion
  • ⏳ Dark mode web UI (optional extension)
  • ⏳ Additional dork packs (Cloud, API, GitHub)
  • ⏳ Automated reporting (PDF/Markdown)

👨‍💻 Author

CYBER-MRINAL 🔗 GitHub • 🌍 (^_^) | Purple Teamer | Cyber Security guy :)


📜 License

This project is released under the MIT License. See the LICENSE file for full details.

  • If any query regarding this tool please ask me on my TELEGRAM

⚡ "Knowledge is the weapon, Dorking is the scope." ⚡

About

WEB-Dorker is a futuristic reconnaissance framework that transforms classic Google dorking into a multi-engine intelligence weapon — precise, automated, and professional.

Topics

Resources

License

Stars

Watchers

Forks

Languages