Skip to content

Adarsh-S-R/DorkIQ

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DorkIQ

Generate focused Google dorks for a target domain. Handy for quick recon and triage.

Demo | Live Tool

What it does

  • Generates dorks across common vuln areas (SQLi, XSS, LFI/RFI, configs, backups, secrets, cloud, etc.)
  • Optional subdomain and advanced modes for broader coverage
  • Includes intent filters and type dropdown
  • Export results

Quick start

pip install -r requirements.txt
python app.py
# open http://localhost:8000

Tip: set DEBUG=true to enable reload during development.

API

  • POST /generate-dorks

Request:

{
  "domain": "example.com",
  "include_subdomains": true,
  "vulnerability_category": "all",
  "advanced_mode": false
}

Response (trimmed):

[
  {
    "category": "High",
    "intent_category": "Vulnerable Technologies",
    "name": "SQL Injection - ID Parameter",
    "dork": "inurl:id= site:example.com",
    "owasp": "A1",
    "notes": "Search for ID parameters vulnerable to SQL injection",
    "tags": ["SQLi", "Parameter"]
  }
]

Other endpoints:

  • GET / UI
  • GET /styles.css, /script.js
  • GET /api/health

Notes

  • This is a community project: it exists to help other researchers share patterns, improve dork hygiene, and reduce false positives. Contributions, improvements, and curated dork packs are very welcome.

About

Google dorks for a target domain

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published