During reconaissance phase or when doing OSINT , we often use google dorking and shodan and thus the idea of Dorkish.
Dorkish is a Chrome extension tool that facilitates custom dork creation for Google and Shodan using the builder and it offers prebuilt dorks for efficient reconnaissance and OSINT engagement.
Installation And Setup
1-克隆存储库
git克隆
https://github.com/yousseflahouifi/dorkish.git 2-转到Chrome: //Extensions/,并在右上角启用开发人员模式。
3-单击“加载打开包装的扩展”按钮,然后选择Dorkish文件夹。
Firefox用户的
Note:,您可以在此处找到扩展名: 3https://Addons.mozilla.org/en-us/firefox/addon/dorkish/
Features
Google dorking
带有关键字的构建器可过滤您的Google搜索结果。预先建造的笨拙赏金计划。在Bug Bounty的侦察阶段使用的预建傻瓜。 Prebuilt dorks for exposed files and directories Prebuilt dorks for logins and sign up portals Prebuilt dorks for cybersecurity jobs
Shodan dorking
Builder with filter keywords used in shodan. Varierty of prebuilt dorks to find IOT , Network infrastructure , cameras , ICS , databases , etc.
Usage
Once you have found or built the dork you need, simply click it and click search.这将带您进入所需的搜索引擎,Shodan或Google,并使用您输入的特定dork。然后,您可以探索并享受与查询相匹配的结果。
TODO
Add more useful dorks and catogories Fix some bugs Add a search bar to search through the results Might add some LLM models to build dorks
Notes
I have built some dorks and I have used some public resources to gather the dorks , here's few : -
https://github.com/lothos612/shodan -
https://github.com/taksec/google-dorks-bug-bounty
Warning
我对使用该工具造成的任何损坏概不负责