Skip to content

The URL Seeker, an advanced dorking tool for discovering URLs associated with a target domain, also includes SQL injection scanning capabilities. This allows users to identify potential vulnerabilities, providing a comprehensive security assessment beyond traditional URL discovery.

License

Notifications You must be signed in to change notification settings

0MeMo07/URL-Seeker

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

URL Seeker

The URL Seeker, an advanced dorking tool for discovering URLs associated with a target domain, also includes SQL injection scanning capabilities. This allows users to identify potential vulnerabilities, providing a comprehensive security assessment beyond traditional URL discovery.

Url_SeekerB

Table of Contents

Introduction

URL Seeker is a Python-based tool designed to simplify the process of discovering URLs associated with a target domain. It leverages enhanced dorking techniques and supports multithreading for faster results.

Features

  • Enhanced dorking with random selection of dorks.
  • Output options to save sorted and unsorted URLs to a file.
  • User-friendly command-line interface.

Installation

  1. Clone the repository:

    git clone https://github.com/0MeMo07/URL-Seeker.git
  2. Change into the project directory:

    cd URL-Seeker
  3. Install the required dependencies:

    pip install -r requirements.txt

Usage

To use URL Seeker, run the following command:

python url_seeker.py

Follow the On-Screen Prompts

Follow the on-screen prompts to configure the scan parameters and initiate the scan.

Options

URL Seeker uses argparse for command-line argument parsing. Here are the available options:

  • --sites: Target Domain (e.g., .com, .org, .net)
  • --dorks: Number of Dorks (0 for all, default: 0)
  • --threads: Number of Threads (recommended range: 50-500)
  • --pages: Pages per Dork (between 25 and 100 at 25 increments)
  • --rdork: 'Y' if you want the dorks to be randomly selected, 'N' if not
  • --S: URL or .txt file
  • --O: Automatically perform SQL injection scanning

Example usage:

Dork Search

python url_seeker.py --sites .com --dorks 10 --threads 50 --pages 50 --rdork Y

for sql injection scanning automatically after the dork scan is finished --O

python url_seeker.py --sites .com --dorks 10 --threads 50 --pages 50 --rdork Y --O

or

python url_seeker.py --O

Sql injection scan

If you enter --S url or .txt it scans for sql injection

python url_seeker.py --S url or .txt

if you want to run it with input:

python url_seeker.py

Output

After the scan, you can choose from the following output options:

  1. Save current sorted URLs to a file.
  2. Save current unsorted URLs to a file.
  3. Print all unsorted URLs.
  4. Print all sorted URLs.
  5. SQL injection scanning sorted URLs.
  6. SQL injection scanning unsorted URLs.

Choose an option by entering the corresponding number.

Contributing

Contributions are welcome! If you have any ideas, enhancements, or bug fixes, please submit a pull request.

License

This project is licensed under the MIT License.

Disclaimer

Use this tool responsibly and in compliance with applicable laws. The author is not responsible for any misuse or damage caused by this tool.

About

The URL Seeker, an advanced dorking tool for discovering URLs associated with a target domain, also includes SQL injection scanning capabilities. This allows users to identify potential vulnerabilities, providing a comprehensive security assessment beyond traditional URL discovery.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages