Lierre is a Python-based tool for discovering potential SQL injection and XSS vulnerabilities in websites using Google dorks. It searches for URLs via Bing, filters them based on specific patterns, and tests for vulnerabilities with predefined payloads. Features include proxy support, randomized User-Agents, and domain blacklisting to avoid irrelevant or high-profile sites.
- Dork-Based Scanning: Queries Bing to find URLs matching user-defined dorks.
- Vulnerability Detection: Tests URLs for SQL injection and XSS vulnerabilities.
- Proxy Integration: Supports HTTP/HTTPS proxies for anonymized scanning.
- User-Agent Rotation: Randomizes User-Agent headers to evade detection.
- Blacklist Filtering: Skips domains like google.com and patterns like login pages.
- Error Logging: Records errors to a log file for troubleshooting.
- Result Export: Saves scan results and vulnerable URLs to a text file.
- Python 3.6 or later
- Python packages:
requests
beautifulsoup4
colorama
-
Clone or Download:
git clone https://github.com/lierree/Advanced-Dork-Scanner cd Advanced-Dork-Scanner
-
Install Dependencies:
pip install requests beautifulsoup4 colorama
-
Set Up Input Files:
- Create
dorks.txt
in the same directory asscanner.py
, listing one dork per line (e.g.,inurl:login.php
). - (Optional) Create
proxies.txt
with one proxy per line (e.g.,http://proxy:port
).
- Create
-
Run the Tool:
python scanner.py
-
Respond to Prompts:
- Use proxy? (yes/no): Type
yes
to use proxies fromproxies.txt
, orno
to skip. - Select scan type (sql/xss): Enter
sql
for SQL injection tests orxss
for XSS tests.
- Use proxy? (yes/no): Type
-
Output:
- URLs and vulnerabilities are shown in the console.
- Results, including dorks and vulnerable URLs with payloads, are saved to
results.txt
. - Errors are logged to
errors.log
.
$ python scanner.py
Lierre - Advanced Dork Scanner
MIT License. See LICENSE for details.
Use proxy? (yes/no): no
Select scan type (sql/xss): sql
[*] Loaded 3 dorks from dorks.txt.
[*] Scanning dork: inurl:login.php
[+] http://example.com/login.php?id=1
[!] SQL vuln: http://example.com/login.php?id=1 [']
[*] Results for 'inurl:login.php' saved to 'results.txt'. Vulnerable URLs: 1
scanner.py
: Core script for scanning and vulnerability testing.dorks.txt
: Input file for dork queries (one per line).proxies.txt
: (Optional) Input file for proxy addresses (one per line).results.txt
: Output file for scan results.errors.log
: Log file for errors.
- Dorks: Edit
dorks.txt
to customize queries. Example:inurl:login.php inurl:admin.asp inurl:search.jsp
- Proxies: Add proxies to
proxies.txt
(e.g.,http://proxy:port
). - Blacklist: Update
blacklist_domains
andblacklist_patterns
inscanner.py
to filter domains or URLs. - Payloads: Modify
sql_payloads
andxss_payloads
inscanner.py
for custom injection tests.
- SyntaxWarning: invalid escape sequence '\ ': Check for stray
\
in code or files; replace with\\
or fix. - Syntax Errors: Verify parentheses and f-strings in
scanner.py
are correct. - No Results: Ensure
dorks.txt
exists with valid queries and check internet/proxy settings. - Colorama Issues: Confirm
colorama
is installed andinit(autoreset=True)
is in the script.
Lierre is for ethical security research and educational purposes only. The author is not liable for misuse or damage caused by this tool. Always obtain explicit permission before scanning or testing any system.