Welcome to the More Dorks repository, a comprehensive collection of categorized dorks by vulnerability types for identifying security weaknesses in web applications.
- Introduction
- Purpose
- Categories of Dorks
- How to Use This Repository
- Examples of Dorks
- File Listings
- Contributing
- License
The More Dorks repository serves as a vital resource for security professionals, penetration testers, and developers involved in security assessment and testing of web applications. It offers an extensive collection of categorized dorks for identifying potential security weaknesses.
This repository aims to provide a structured catalog of dorks categorized by specific vulnerability types, assisting users in identifying potential security weaknesses in web applications. It's designed to streamline security assessment and testing efforts.
The repository categorizes dorks into specific types, each representing common security vulnerabilities frequently encountered in web applications. Each category offers a targeted selection of dorks relevant to that specific vulnerability type.
- SQL Injection: Dorks for SQL injection vulnerabilities.
- Cross-Site Scripting (XSS): Dorks targeting XSS vulnerabilities.
- Path Traversal: Dorks for identifying path traversal vulnerabilities.
- Local File Inclusion (LFI): Dorks related to LFI vulnerabilities.
- Remote File Inclusion (RFI): Dorks focused on RFI vulnerabilities.
- Error-based Injection: Dorks centered around error-based injection vulnerabilities.
- Time-Based Blind SQL Injection: Dorks related to time-based blind SQL injection vulnerabilities.
- Server-Side Template Injection: Dorks targeting server-side template injection.
- Directory Listing: Dorks designed to find directory listings.
- Command Injection: Dorks for identifying command injection vulnerabilities.
- XML External Entity (XXE): Dorks for XXE vulnerabilities.
- Authentication Bypass: Dorks aimed at identifying authentication bypass vulnerabilities.
- Header Injection: Dorks for finding header injection vulnerabilities.
Each category contains a range of dorks designed to uncover vulnerabilities specific to that type.
Here are some of the important files and their actions in the repository:
Discord.txt
Files.txt
Gaming.txt
MIX1.txt
Minecraft.txt
RFI1.txt
Shoping10k.txt
best1.txt
best2.txt
best3.txt
best4.txt
:best5(8k).txt
best6(8k).txt
best7(5k).txt
best8.txt
ip+dorks.txt
sensitive1.txt
The dorks are organized into folders based on their vulnerability categories. Users can navigate through these folders to explore specific dorks relevant to their security testing requirements. Each category folder contains a README file offering detailed information and examples for the dorks within that category.
-
SQL Injection to List Users:
SELECT username, password FROM users
-
SQL Injection Error Messages:
You have an error in your SQL syntax
-
XSS Payload in URL Parameter:
<script>alert('XSS')</script>
-
XSS in Form Input:
<img src=x onerror=alert('XSS')>
The GDorks repository is a comprehensive resource that contains an extensive collection of dorks, categorized folders, and detailed documentation covering various cyber attack vectors, methods, and tools.
Contributions to this repository are encouraged! If you have additional dorks, examples, or documentation to share, please follow these steps:
- Fork the repository.
- Create a new branch with a descriptive name.
- Add your dorks or other content.
- Submit a pull request.
Contributions from the security community enrich the repository's depth and relevance.
Explore, learn, and contribute responsibly to improve security testing efforts.
Happy hunting for security vulnerabilities, and remember to conduct your tests ethically and responsibly.