Dorku is a web application designed to help bug bounty hunters and security researchers by providing a collection of useful and critical Google Dorks. The platform allows users to explore and search for various types of dorks categorized based on common web vulnerabilities and misconfigurations.
The main goal of this website is to provide an easy-to-use tool that can help security professionals find vulnerable web pages, databases, and sensitive files through simple search queries.
- Comprehensive Collection of Google Dorks: Organized into categories such as
directoryLeaks
,sensitiveFiles
,exposedDatabases
,misconfigurations
, and more. - Search Functionality: Easily search for specific domains to quickly apply dorks and find potential vulnerabilities.
- Categorized Dorks: Dorks are grouped into categories based on their type, such as sensitive files, login pages, exposed APIs, and more.
- Intuitive UI: A clean and user-friendly interface that allows you to select categories, search domains, and view the relevant dorks.
The Google Dorks provided on Dorku are grouped into the following categories:
- Directory Leaks: Dorks that help find open directories on web servers.
- Sensitive Files: Dorks that locate sensitive files like
.env
,config.php
, and other critical configurations. - Exposed Databases: Find exposed database backups, SQL dumps, and admin interfaces.
- Login Pages: Discover login forms or admin panels for potential brute-force or credential stuffing attacks.
- Misconfigurations: Find misconfigurations in web servers, git repositories, and other vulnerable points.
- Vulnerable Endpoints: Search for potentially vulnerable API endpoints or admin areas.
- Sensitive Information: Dorks to find leaked sensitive data like passwords, keys, and API tokens.
- Cloud Misconfigurations: Dorks to find misconfigured cloud resources like AWS S3, Azure Blob Storage, and others.
- Open Source Code: Find exposed open-source repositories and source code with potential vulnerabilities.
- Admin Interfaces: Find exposed admin panels and dashboards that could be targeted for exploitation.
- Vulnerable Files: Dorks to locate backup files or other vulnerable files on a server.
- Exposed APIs: Find exposed APIs that may leak sensitive data or have insecure endpoints.
You can visit the live demo of the Dorku web application here:
Dorku - Google Dorks for Bug Bounty
To run this project locally on your machine:
-
Clone this repository:
git clone https://github.com/<your-github-username>/dorku.git
-
Navigate to the project directory:
cd dorku
-
Install dependencies:
npm install
or
yarn install
-
Run the development server:
npm run dev
or
yarn dev
-
Open the app in your browser by visiting
http://localhost:3000
.
- Next.js: The framework for building the React application.
- React: For building the interactive components and state management.
- Tailwind CSS: For styling the application with a utility-first CSS framework.
- Vercel: The platform used to deploy and host the application.
If you'd like to contribute to the development of this project, feel free to fork the repository and make changes. Pull requests are welcome!
- Fork the repository.
- Create a new branch (
git checkout -b feature-branch
). - Make your changes and commit them (
git commit -m 'Add new feature'
). - Push to the branch (
git push origin feature-branch
). - Open a pull request to the
main
branch.
This project is licensed under the MIT License - see the LICENSE file for details.
This website is for educational purposes only. The use of Google Dorks and other security techniques should be conducted in accordance with the law and ethical guidelines. Always obtain permission before testing any website or system for vulnerabilities.
For any inquiries or feedback, feel free to reach out: