DorkScraper is a simple tool written in Python to extract all the urls that appear when using a Google Dork.
The author of this document take no responsibility for correctness. This project is merely here to help guide security researchers towards determining whether something is vulnerable or not, but does not guarantee accuracy.
pip3 install -r requirements.txt
python3 dorkScraper.py -d "inurl:/.well-known/security.txt" 2
____ _ ____
| _ \ ___ _ __| | __/ ___| ___ _ __ __ _ _ __ ___ _ __
| | | |/ _ \| '__| |/ /\___ \ / __| '__/ _` | '_ \ / _ \ '__|
| |_| | (_) | | | < ___) | (__| | | (_| | |_) | __/ |
|____/ \___/|_| |_|\_\|____/ \___|_| \__,_| .__/ \___|_|
|_|
DorkScraper v.1.0 - Open Source Project | Author: Robotshell | Twitter: https://twitter.com/robotshelld
Starting DorkScraper to recollect all the URLs that appear with the dork inurl:/.well-known/security.txt site:.es
https://creative-quality.es/.well-known/security.txt
https://www.canon.es/.well-known/security.txt
- If you've earned a bug bounty using this tool, please consider donating to support it's development. You can help me to develop more useful scripts and tools. Thanks 😍