Dorks

List tools that assist with using advanced search engine filters on indexable content (a practice commonly known as Google Dorking).

6 listed tools Last update on 2025-04-28

Up a Level Contribute

Cyber Kill Chain

Recon: Information gathering stage, where attackers gather as much information as possible about the target.

Weaponization: Crafting of tools or payloads to exploit vulnerabilities.

Delivery: The transmission of the weaponized payload to the target.

Exploitation: Exploiting a vulnerability to gain access to the target system.

Installation: Establishing a foothold on the target system.

Command & Control (C2): Setting up channels for communication with the compromised system.

Actions on Objectives: Achieving the intended goal of the attack, such as data exfiltration or system disruption.

BinGoo 

Open-source    

GNU/Linux bash-based Bing and Google Dorking Tool

dork-bot 

Open-source    

Command line Google dork tool

Dorksearch 

Free    

Easy dorks with pre-build queries.

fast-recon 

Open-source    

Script to perform Google dorks against a domain

GooDork 

Open-source    

Command line Google dorking tool

snitch 

Open-source    

Scripts to use dorks to gather information