Automate sending dorked queries to search engine
Project description
DorkScan
An atypical search engine scanner that scans search engines with dorked queries returning potentially vulnerable URLs.
Installation
PyPI
pip install dorkscan
Source
If using a virtual environment pass the full directory path to where you cloned DorkScan
$git clone https://gitlab.com/unkwn1/dorkscan.git
$cd dorkscan
$pip install -e dorkscan
DorkScan Function
Scrape a search engine result page for (potentially) vulnerably sites.
def DorkScan(
dorks: list[str],
search_engine: str="BING",
pages: int=1,
console: Console=Console()
) -> list[ScanResults]
Usage
To view an example of the function in action run:
python3 -m dorkscan
from dorkscan import DorkScan
results = DorkScan(
search_engine: str="BING",
pages: int=1,
dorks: list = ["inurl:.php?", "inurl:admin.php"]
)
print(results)
Args
Required Args
dorks: list[str] -
a list of string dork queries ie. "inurl:.php?=","inurl:admin.php"
search_engine: str -
Bing / Ask / Wow.
Optional Args
pages: int -
Number of search engine result pages to scan.
silent: bool -
Disable stdout printing
console: Console -
[rich](https://rich.readthedocs.io/en/stable/reference/console.html) console object for printing.
Return
`list[ScanResults]` -
list item for each page. Each page's result dictionary contains `{"dork": str, "links": list}`
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
dorkscan-0.1.1.tar.gz
(17.5 kB
view hashes)
Built Distribution
dorkscan-0.1.1-py3-none-any.whl
(18.8 kB
view hashes)