11/12 free views
Dataset
Dataset
Web Security

GDorks

by Ishanoshada

540stars
89forks
10watchers
Updated 10 months ago
About

GDorks is a comprehensive Google dork dataset and web application that helps security researchers uncover hidden vulnerabilities and sensitive information across the internet using over 320+ categorized dorks.

Google Dork List - Uncover the Hidden Gems of the Internet ( There are at least 320+ categories ) + Web App

Primary Use Case

GDorks is primarily used by penetration testers, bug bounty hunters, and security analysts to discover vulnerable web assets and sensitive data exposed on the internet through advanced Google search queries known as dorks. It serves as a rich resource for vulnerability scanning and exploitation by providing a vast, categorized list of dorks that can be integrated into automated tools or used manually.

Key Features
  • Extensive dataset of over 3 million Google dorks categorized into 320+ categories
  • Includes specialized dork lists for SQL Injection (SQLi), Cross-Site Scripting (XSS), Local File Inclusion (LFI), and other vulnerabilities
  • Organized file structure with categorized dork text files for easy navigation and use
  • Web application interface for exploring and using dorks interactively
  • Supports multiple web security domains including vulnerable servers, sensitive directories, and database files
  • Open source with MIT license and active GitHub community
  • Includes country-specific Google dork lists and syntax examples
Security Frameworks
Reconnaissance
Discovery
Initial Access
Execution
Collection
Usage Insights
  • Integrate GDorks dataset with automated vulnerability scanners to enhance reconnaissance and discovery phases.
  • Use categorized dorks to tailor red team campaigns targeting specific vulnerability classes like SQLi and XSS.
  • Leverage the web app interface for interactive exploration during penetration testing and bug bounty engagements.
  • Incorporate country-specific dork lists for focused regional threat assessments and attack surface mapping.
  • Combine GDorks with continuous monitoring tools to detect accidental exposure of sensitive data in real-time.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about GDorks. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team85%
Blue Team35%
Purple Team55%
Details
LicenseMIT License
Open Issues3
Topics
ceh
dork
dorks
google
google-hacking
google-hacking-database
hacking
bugbounty
ghdb
google-dork