DorkStorm is a powerful tool for hacking with Google dorks. DorkStorm allows security researchers, penetration testers, and ethical hackers to easily search and discover hidden information on the internet. By leveraging advanced Google search operators, DorkStorm can uncover vulnerabilities and sensitive data that may be exposed online, helping security professionals to identify potential attack vectors and assess the security posture of their targets. DorkStorm is designed to be customizable, allowing users to create their own dork queries and save them for future use. It also includes a number of built-in search templates for common use cases. Whether you're a seasoned security professional or a beginner just starting out with Google dorks, DorkStorm is the perfect tool for hacking and discovering hidden information on the internet.
Explore the docs »
Report Bug
·
Request Feature
To install the project and its dependencies, follow these steps:
- Clone the repository to your local machine:
git clone https://github.com/cryxnet/dorkstorm.git
- Navigate to the project directory:
cd dorkstorm
- Create a virtual environment for the project:
python -m venv venv
- Activate the virtual environment:
On Windows:
venv\Scripts\activate
On macOS or Linux:
source venv/bin/activate
- Install the project dependencies:
pip install -r requirements.txt
- Go the directory where the main file is located and execute it
cd dorkstorm &&
python dorkstorm.py
DorkStorm - A tool for Google dorks
Commands:
help Show this help message | help
search Search the Google dorks database | search <attribute> <value>
set Sets an extra query parameter | set <key> <value>
unset Unsets an extra query parameter | unset <key>
get Gets an extra query parameter | get <key> (or configs to get all)
use Sets an base google dorks attack | use <dork_query_id>
update query Updates the query database | update query
build query Builds the query and outputs it | build query
save query Saves the current query that is stored in context | save query
execute Executes the query | execute <flag> (--headless (--limit pages), --browser)
pentest site Execute all queries to a website | pentest site <domain>
quit / exit Exit the program
- We are using the ExploitDB | GHDB database for all the base queries.
- We get the data from the ghdb.xml file that is stored in the Gitlab | Exploit-DB repository
YOUR USAGE OF THIS PROJECT CONSTITUTES YOUR AGREEMENT TO THE FOLLOWING TERMS:
THE MISUSE OF THE DATA PROVIDED BY THIS PROJECT AND ITS MALWARES MAY LEAD TO CRIMINAL CHARGES AGAINST THE PERSONS CONCERNED.
I DO NOT TAKE ANY RESPONSIBILITY FOR THE CASE. USE THIS PROJECT ONLY FOR RESEARCH PURPOSES, EDUCATIONAL PURPOSES & ETHICAL ONLY.
DorkStorm is a project related to Computer Security and for Educational Purposes and not a project that promotes illegal activities.
Don't use this Project for any illegal activities.
If something happens, we do not take any liability.
DorkStorm should be considered as a project for educational purposes.
Created by cryxnet
If you find this project helpful, please give it a ⭐️ on GitHub to show your support. I would also appreciate it if you shared it with others who might find it useful!