
DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficiently. The tool generates multiple Google Dork search queries for a given domain and opens them in new browser tabs to help identify potential vulnerabilities.
🛠How To Use
- Visit Live DorkTerm URL https://yogsec.github.io/DorkTerm/
Features
- Terminal-inspired user interface with a green and black theme.
- Runs 15 predefined Google Dork queries for security reconnaissance.
- Built with Bootstrap for responsive design.
- User guidance on enabling popups for effective usage.
- Lightweight and easy to use.
How It Works
- Enter a target domain in the input field (e.g., example.com).
- Click the "Run" button to initiate Google Dork queries.
- The tool opens multiple tabs, each performing a different Google Dork search.
- Analyze the results on Google for potential vulnerabilities.
Google Dorks Included
The tool generates searches for common vulnerabilities, including:- site:example.com inurl:login - Login pages.
- site:example.com inurl:admin - Admin pages.
- site:example.com ext
hp - PHP files.
- site:example.com ext:sql - SQL files.
- site:example.com ext:xml - XML files.
- site:example.com ext:json - JSON files.
- site:example.com "index of" - Directory listings.
- site:example.com "password" - Exposed passwords.
- site:example.com "error" - Error messages.
- site:example.com intitle:"index of" - Directory indexes.
- site:example.com inurl:wp-content - WordPress content.
- site:example.com filetype:config - Configuration files.
- site:example.com ext:bak - Backup files.
- site:example.com ext:log - Log files.
- site:example.com ext:env - Environment files.##
Let's Connect!