Skip to content

Google Custom Search Integration: Utilizes Google's Custom Search API to find potentially vulnerable URLs using search dorks. Automated SQL Injection Testing: Automatically checks URLs for common SQL injection vulnerabilities.

License

Notifications You must be signed in to change notification settings

xfnx-17/DorkHunter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

44 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DorkHunter

Advanced SQL Injection vulnerability scanner using Google dorking techniques

🚀 Features

  • Google Custom Search Integration: Find vulnerable URLs using search dorks (e.g., inurl:product?id=)
  • Automated SQLi Testing: Comprehensive checks for error-based, boolean-based, and time-based SQLi
  • Concurrent Scanning: Multi-threaded architecture for efficient scanning
  • Smart Detection: Dynamic parameter analysis and payload rotation
  • CSV Reporting: Export results for further analysis
  • Stealth Mode: Randomized delays and user-agent rotation

📋 Requirements

1. Python 3.8+

2. Google API Credentials

  • Custom Search JSON API Key
  • Custom Search Engine (CSE) ID

⚙️ Setup

1. Clone Repository

git clone https://github.com/xfnx-17/DorkHunter.git
cd DorkHunter

2. Create Virtual Environment

Linux/macOS

python3 -m venv venv
source venv/bin/activate

Windows

python -m venv venv
venv\Scripts\activate

3. Install Dependencies

pip install -r requirements.txt

4. Configure API Credentials

  1. Get Google API Key
  2. Create Custom Search Engine
  3. Run script and enter credentials when prompted

🎮 Usage

python DorkHunter.py

Workflow:

  1. Enter Google API credentials
  2. Input search dork (e.g., inurl:login.php?id=)
  3. Set maximum vulnerable URLs to find
  4. Choose to save results (CSV report)
  5. Review detected vulnerabilities

Example Output:

██████╗  ██████╗ ██████╗ ██╗  ██╗██╗  ██╗██╗   ██╗███╗   ██╗████████╗███████╗██████╗
██╔══██╗██╔═══██╗██╔══██╗██║ ██╔╝██║  ██║██║   ██║████╗  ██║╚══██╔══╝██╔════╝██╔══██╗
██║  ██║██║   ██║██████╔╝█████╔╝ ███████║██║   ██║██╔██╗ ██║   ██║   █████╗  ██████╔╝
██║  ██║██║   ██║██╔══██╗██╔═██╗ ██╔══██║██║   ██║██║╚██╗██║   ██║   ██╔══╝  ██╔══██╗
██████╔╝╚██████╔╝██║  ██║██║  ██╗██║  ██║╚██████╔╝██║ ╚████║   ██║   ███████╗██║  ██║
╚═════╝  ╚═════╝ ╚═╝  ╚═╝╚═╝  ╚═╝╚═╝  ╚═╝ ╚═════╝ ╚═╝  ╚═══╝   ╚═╝   ╚══════╝╚═╝  ╚═╝

DorkHunter by xfnx

[+] Found 2 vulnerable URLs:
1. http://vuln-site.com/product?id=1'--
2. http://test-store.com/user?id=2' WAITFOR DELAY '0:0:5'--

📂 File Structure

📂 DorkHunter/
├── 📄 DorkHunter.py                             - Main scanner script
├── 📄 LICENSE                                   - MIT/GPL? License file  
├── 📄 README.md                                 - Documentation
├── 📄 payloads.txt                              - SQLi payload database
├── 📄 requirements.txt                          - Python dependencies
└── 📄 user_agents.txt                           - Browser signature rotations

🔐 Security Notes

  • 🔒 API keys are never stored or transmitted
  • ⚠️ Respect robots.txt and website terms of service
  • ⚖️ Use only on authorized targets
  • 📉 API requests are minimized to reduce Google quota usage

🛠️ Tech Stack

Tech Stack

📊 GitHub Stats

Top Languages

🌟 Contributing

Found a bug? Have an improvement?

  1. Fork the repository
  2. Create your feature branch
  3. Submit a pull request

📜 License

This project is for educational purposes only. Use responsibly.

About

Google Custom Search Integration: Utilizes Google's Custom Search API to find potentially vulnerable URLs using search dorks. Automated SQL Injection Testing: Automatically checks URLs for common SQL injection vulnerabilities.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages