The ultimate search engine reconnaissance tool for ethical hackers and security researchers. Uncover hidden vulnerabilities with advanced dorking techniques.
Query across Google, Bing, DuckDuckGo, Yahoo, Baidu, and Yandex simultaneously for comprehensive results with automated request rotation.
Pre-built dork categories for filetypes, login pages, config files, vulnerabilities, and subdomains with customizable templates.
Export results in JSON, CSV, or plain text formats with detailed metadata for easy integration with other security tools.
$ python ezdorker.py example.com -e google bing -c filetype login -v -o results.json
[+] EZDorker v1.0 - Cyber Reconnaissance Tool
[+] Initializing with 4 threads...
[+] Target: example.com
[+] Engines: google, bing
[+] Dork categories: filetype, login
[+] Generated 12 dork queries
[+] Starting reconnaissance...
[1/12] Executing: site:example.com filetype:pdf
[+] GOOGLE: Found 3 results (0.8s)
[+] BING: Found 2 results (1.1s)
[2/12] Executing: site:example.com inurl:login
[+] GOOGLE: Found admin panel at /admin/login (0.6s)
[+] BING: Found 1 result (0.9s)
[+] Scan completed in 28.4 seconds
[+] Results saved to: results.json
[+] 42 unique endpoints discovered
• Python 3.6+ (recommended 3.9+)
• pip package manager
• 256MB RAM minimum
• Internet connection
# Clone the repository
git clone https://github.com/alastorapps/ezdorker-tool.git
cd ezdorker
# Install dependencies
pip install -r requirements.txt
# Or install manually
pip install requests beautifulsoup4 colorama
# Pull the Docker image
docker pull alastorapps/ezdorker-tool:latest
# Run with basic parameters
docker run -it --rm alastorapps/ezdorker-tool example.com
python ezdorker.py example.com
| Option | Description | Example |
|---|---|---|
-o OUTPUT |
Save results to file (JSON/CSV/TXT) | -o results.json |
-e ENGINES |
Search engines (space-separated) | -e google bing yandex |
-c CATEGORIES |
Dork categories to use | -c filetype login |
-t THREADS |
Number of threads (default: 4) | -t 8 |
-d DELAY |
Delay between requests (seconds) | -d 3 |
-b |
Open dorks in browser | -b |
-v |
Verbose output mode | -v |
# Comprehensive scan with all options
python ezdorker.py example.com \
-o results.csv \
-e google bing duckduckgo \
-c filetype login config vulnerabilities \
-t 6 \
-d 2 \
-v \
-b
| Engine | Status | Features | Rate Limit |
|---|---|---|---|
| Full Support | Advanced operators, pagination | Strict | |
| Bing | Full Support | API-like results, fast | Moderate |
| DuckDuckGo | Full Support | Privacy focused, no JS | Lenient |
| Yahoo | Full Support | Bing-powered, alternative | Moderate |
| Baidu | Basic Support | Chinese results | Strict |
| Yandex | Basic Support | Russian results | Moderate |
-d flag to increase delay between requests (recommended 3-5 seconds)-e google bing duckduckgo-t 2 for more stealthFor most use cases, JSON (-o results.json) is recommended because:
For quick review, CSV is good for spreadsheet analysis, and TXT is most human-readable.
Yes! Edit the DORKS dictionary in the script to add your own patterns:
DORKS = {
"custom": [
"site:{target} ext:php intext:'admin'",
"site:{target} intitle:'index of' password",
# Add your custom dorks here
],
# ... existing categories
}
Then use with -c custom parameter.