WEB-Dorker is not just another search script – it’s a futuristic reconnaissance companion.
Crafted for ethical cybersecurity research, this tool empowers researchers, bug bounty hunters, and penetration testers to uncover digital exposure using multi-engine dorking intelligence.
It merges classic hacker-style dorking with a professional workflow, ensuring logs, automation, and customizable search patterns — all wrapped in a minimal yet powerful design.
🚀 Multi-Engine Search → Google • Bing • DuckDuckGo
📂 60 Verified Templates → 6 Security Categories × 10 Queries Each
🛠 Custom Dork Mode → Build and run your own intelligence queries
🗂 Session Logging → TXT • JSONL • CSV (organized, timestamped)
📜 History Mode → Revisit & relaunch past sessions instantly
🖥 Classic Hacker Display → Dual-column query menu with color-coded navigation
1️⃣ Directory & Index Exposure
2️⃣ Login Pages
3️⃣ Sensitive Files
4️⃣ Vulnerable Applications
5️⃣ Cloud & Credential Leaks
6️⃣ Cameras & IoT Devices
Clone the repo:
git clone https://github.com/CYBER-MRINAL/WEB-Dorker.git
cd WEB-Dorker
Install requirements:
pip3 install colorama
Run the tool:
python3 web-dorker.py
Inside the tool:
H
→ Browse historyC
→ Enter custom dork modeQ
→ Quit gracefully
🔮 Example workflow:
Enter (domain) or (option):> example.com
Choose search engine: [1] Google [2] Bing [3] DuckDuckGo
Choose categories:> 1,5
Dork selection:> all

Every session is preserved inside dork_logs/
with rich formats:
- TXT → Human-readable reference
- JSONL → Structured machine logs
- CSV → Tabular for reports & analysis
🛑 This project is created for defensive security research only. Running WEB-Dorcker against systems you do not own or manage may be illegal. The author (CYBER-MRINAL) is not liable for misuse. Always follow responsible disclosure and ethical hacking principles.
- ⏳ AI-assisted query suggestion
- ⏳ Dark mode web UI (optional extension)
- ⏳ Additional dork packs (Cloud, API, GitHub)
- ⏳ Automated reporting (PDF/Markdown)
CYBER-MRINAL 🔗 GitHub • 🌍 (^_^) | Purple Teamer | Cyber Security guy :)
This project is released under the MIT License. See the LICENSE file for full details.
- If any query regarding this tool please ask me on my TELEGRAM
⚡ "Knowledge is the weapon, Dorking is the scope." ⚡