Skip to main content

Automate sending dorked queries to search engine

Project description


An atypical search engine scanner that scans search engines with dorked queries returning potentially vulnerable URLs.



pip install dorkscan


If using a virtual environment pass the full directory path to where you cloned DorkScan

$git clone
$cd dorkscan
$pip install -e dorkscan

DorkScan Function

Scrape a search engine result page for (potentially) vulnerably sites.

def DorkScan(
    dorks: list[str],
    search_engine: str="BING",
    pages: int=1,
    console: Console=Console()
    ) -> list[ScanResults]


To view an example of the function in action run: python3 -m dorkscan

from dorkscan import DorkScan
results = DorkScan(
    search_engine: str="BING",
    pages: int=1,
    dorks: list = ["inurl:.php?", "inurl:admin.php"]


Required Args

dorks: list[str] -
    a list of string dork queries ie. "inurl:.php?=","inurl:admin.php"
search_engine: str -
    Bing / Ask / Wow.

Optional Args

pages: int -
    Number of search engine result pages to scan.
silent: bool -
    Disable stdout printing
console: Console -
    [rich]( console object for printing.


`list[ScanResults]` -
    list item for each page. Each page's result dictionary contains `{"dork": str, "links": list}`

Project details

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dorkscan-0.1.1.tar.gz (17.5 kB view hashes)

Uploaded source

Built Distribution

dorkscan-0.1.1-py3-none-any.whl (18.8 kB view hashes)

Uploaded py3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page