Information gethering
GitHub dorking
CMS dorking
CVE Search
Author Informations
My Twitter
My Linkedin
My Facebook Page
My Telegram
My Github
Enter Target Domain:
Subdomain finding:
crt.sh
dorki.attaxa.com
securitytrails.com
searchdns.netcraft.com
vedbex.com
viewdns.info
*.Google
*.Google.*
*.*.Google.*
*.*.*.Google
*.*.*.*.Google
*.*.*.*.*.Google
*.*.*.*.*.*.*.Google
hunter.how
search.censys.io
shodan.io
Bing
Technology detector:
builtwith.com
webtechsurvey.com
w3techs.com
whatcms.org
Port scanning:
viewdns.info
dnschecker.org
web-check.xyz
URLs collecting:
web.archive.org
urlscan.io
otx.alienvault.com
virustotal.com (API)
Information disclosure:
Directory listing vulnerabilities
exposed FTP
Find PDF's
Exposed configuration file
File upload endpoints
Exposed database
Exposed Log
Backup & Old files
Publicly exposed documents
Find emails
Find password 1
Find password 2
Find password emails
Sensitive Documents #1
Apache config Files
Apache STRUTS RCE
Robots.txt
phpinfo
Apache Server Status
.htaccess sensitive files
Install/Setup Files
3rd Party Exposure
Finding exposed cloud service credentials
Digital Ocean Spaces
Firebase
s3 Bucket
Google APIs
Google drive
Azure
OneDrive
DropBox
Google Docs
Reverse IP Lookup
Source Code-Public[WWW]
securityheaders.com
Check Website OS
Login/Admin finder
Finding Backdoors
Employees on LinkedIn
Employees on facebook
Employees on twitter
All vulnerability:
SQLi Parameters (51)
SQLi Parameters (68)
Error SQLIs (71)
Error SQLIs (16)
Post Parameters (3)
Open Redirects (41)
Open Redirects (18)
SSRF Params (24)
RCE Params (23)
XSS Params (27)
XSS Params (22)
Idor Params (12)
LFI Params (24)
information disclosure ext (58)
GitHub normal dorking:
GitLab
.git
API_KEY/api_key/API_SECRET/api_secret
filename:.env
password/secrat/credential
confidential/sensitive
fatal/error/exception
password/secret/credential/in:file branch.*
extension:json/yml/xml/config
token/access_token
filename:config/settings
secrets.
GitHub advance dorking:
Payloads link
Get Lists
Enter your custom payloads by every new line
Target
Generate links
CMS dorking:
WP juicy ext (19)
wp_users
CVE Search:
Enter the CVE:
0day.today
cve.mitre.org
access.redhat.com
exploit-db.com
vulnerability-lab.com
packetstormsecurity.com
cisa.gov
cve in github
cve in github 2
cve in google
More dork engines
exploit-db.com
dorki.attaxa.com
dorksearch.com
Developed by
Mijan Haque