Key Features of TDork1. Dork Generation (DorkGen)TDork allows users to create custom Google dorks for specific search patterns. Users can input keywords, file types, and parameters to generate precise search queries.
2. Automated Dork ScanningTDork can scan websites using a list of dorks to identify:
- Open directories
- Exposed configuration files
- SQL injection vulnerabilities
- Login pages
- Sensitive documents (PDF, DOCX, XLSX)
- Bing
- DuckDuckGo
- Yahoo
- Proxy integration (HTTP, SOCKS)
- User-agent rotation
- Delay between requests
- Import existing dork lists (e.g., GHDB – Google Hacking Database)
- Export results for further analysis
- Save custom dorks for future use
- SQLi (SQL Injection) vulnerable pages
- Exposed admin panels
- Unsecured cameras (IoT devices)
- Git/SVN repository leaks
- CLI (Command-Line Interface) for automation
- GUI (Graphical User Interface) for ease of use