Skip to content

Latest commit

 

History

History
41 lines (28 loc) · 1.32 KB

README.md

File metadata and controls

41 lines (28 loc) · 1.32 KB

dorks

google hack database automation tool

USAGE:

phantomjs dorks.js [command] [options]

commands: ghdb, google

options (ghdb):

-q [words]                  query from exploit-db GHDB
-c [name or id]             category from exploit-db GHDB
-l                          list exploit-db GHDB categories

options (google):

-d [dork]                   specify google dork
-D [dork_file]              specify google dorks
-s [site]                   set site name
-S [sites_file]             set sites filename
-f [filter]                 set custom filter
-t [msec]                   set timeout between query
-T [msec]                   set captcha retry timeout

options common:

-o [result_file]            save data in file

EXAMPLES:

phantomjs dorks.js ghdb -q oracle -o oracle_dorks.txt
phantomjs dorks.js ghdb -c "vulnerable files" -o vuln_files.txt
phantomjs dorks.js ghdb -c 0 -o all_dorks.txt

phantomjs dorks.js google -D all_dorks.txt -s "somesite.com" -o result.txt
phantomjs dorks.js google -d "mysql running.on" -S "sites.txt"
phantomjs dorks.js google -D vuln_files.txt -S "sites.txt" -o result.txt
phantomjs dorks.js google -D vuln_servers.txt -f "inurl:com" -f "inurl:net"

REQUIRE: phantomjs