Skip to content

DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficiently. The tool generates multiple Google Dork search queries for a given domain and opens them in new browser tabs to help identify potential vulnerabilities.

License

Notifications You must be signed in to change notification settings

yogsec/DorkTerm

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DorkTerm

DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficiently. The tool generates multiple Google Dork search queries for a given domain and opens them in new browser tabs to help identify potential vulnerabilities.

DorkTerm


🛠 How To Use

  1. Visit Live DorkTerm URL https://yogsec.github.io/DorkTerm/

🔥 Features

  • Terminal-inspired user interface with a green and black theme.
  • Runs 15 predefined Google Dork queries for security reconnaissance.
  • Built with Bootstrap for responsive design.
  • User guidance on enabling popups for effective usage.
  • Lightweight and easy to use.

🚀 How It Works

  1. Enter a target domain in the input field (e.g., example.com).
  2. Click the "Run" button to initiate Google Dork queries.
  3. The tool opens multiple tabs, each performing a different Google Dork search.
  4. Analyze the results on Google for potential vulnerabilities.

📋 Google Dorks Included

The tool generates searches for common vulnerabilities, including:

  1. site:example.com inurl:login - Login pages.
  2. site:example.com inurl:admin - Admin pages.
  3. site:example.com ext:php - PHP files.
  4. site:example.com ext:sql - SQL files.
  5. site:example.com ext:xml - XML files.
  6. site:example.com ext:json - JSON files.
  7. site:example.com "index of" - Directory listings.
  8. site:example.com "password" - Exposed passwords.
  9. site:example.com "error" - Error messages.
  10. site:example.com intitle:"index of" - Directory indexes.
  11. site:example.com inurl:wp-content - WordPress content.
  12. site:example.com filetype:config - Configuration files.
  13. site:example.com ext:bak - Backup files.
  14. site:example.com ext:log - Log files.
  15. site:example.com ext:env - Environment files.## 🌟 Let's Connect!

Hello, Hacker! 👋 We'd love to stay connected with you. Reach out to us on any of these platforms and let's build something amazing together:

🌐 Website: https://yogsec.github.io/yogsec/
📜 Linktree: https://linktr.ee/yogsec
🔗 GitHub: https://github.com/yogsec
💼 LinkedIn (Company): https://www.linkedin.com/company/yogsec/
📷 Instagram: https://www.instagram.com/yogsec.io/
🐦 Twitter (X): https://x.com/yogsec
👨‍💼 Personal LinkedIn: https://www.linkedin.com/in/cybersecurity-pentester/
📧 Email: [email protected]


☕ Buy Me a Coffee

If you find our work helpful and would like to support us, consider buying us a coffee. Your support keeps us motivated and helps us create more awesome content. ❤️

Support Us Here: https://buymeacoffee.com/yogsec


About

DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficiently. The tool generates multiple Google Dork search queries for a given domain and opens them in new browser tabs to help identify potential vulnerabilities.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

 

Packages

No packages published

Languages