A Python-based tool for generating Google dorks by combining different search patterns and parameters. This tool helps security researchers and penetration testers create comprehensive lists of Google dorks for their research.
💡 Pro Tip: Star this repository to keep it handy for future reference!
- Generates Google dorks using customizable patterns and parameters
- Supports multiple input files for different dork components
- Randomizes generated dorks
- Error handling and validation
- Cross-platform compatibility
- Easy to extend and customize
- Python 3.7+
- No external dependencies required
- Clone the repository:
git clone https://github.com/Zold1/sqli-dorks-generator.git
cd dork-generator
- Make sure you have the required input files (see Input Files section below)
Run the script:
python dorks.py
The script will prompt you for input file locations. Press Enter to use default filenames:
- sites.txt
- keywords.txt
- page_types.txt
- page_parameters.txt
- search_functions.txt
- patterns.txt
Output will be saved to dorks.txt
.
Create the following text files in the same directory as the script:
site:example.com
site:*.example.com
password
admin
login
filetype:pdf
filetype:doc
ext:php
inurl:admin
inurl:login
intitle:admin
intext:
intitle:
inurl:
{site} {keyword} {page_type}
{site} {page_parameter} {search_function}{keyword}
You can modify the input files to customize the generated dorks according to your needs. Each component will be combined according to the patterns specified in patterns.txt
.
dork-generator/
├── dorks.py
├── README.md
├── sites.txt
├── keywords.txt
├── page_types.txt
├── page_parameters.txt
├── search_functions.txt
└── patterns.txt
- Fork the repository
- Create a new branch for your feature
- Commit your changes
- Push to your branch
- Create a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
For questions, suggestions, or issues, please open an issue in the GitHub repository.