The URL Seeker, an advanced dorking tool for discovering URLs associated with a target domain, also includes SQL injection scanning capabilities. This allows users to identify potential vulnerabilities, providing a comprehensive security assessment beyond traditional URL discovery.
URL Seeker is a Python-based tool designed to simplify the process of discovering URLs associated with a target domain. It leverages enhanced dorking techniques and supports multithreading for faster results.
- Enhanced dorking with random selection of dorks.
- Output options to save sorted and unsorted URLs to a file.
- User-friendly command-line interface.
-
Clone the repository:
git clone https://github.com/0MeMo07/URL-Seeker.git
-
Change into the project directory:
cd URL-Seeker
-
Install the required dependencies:
pip install -r requirements.txt
To use URL Seeker, run the following command:
python url_seeker.py
Follow the on-screen prompts to configure the scan parameters and initiate the scan.
URL Seeker uses argparse
for command-line argument parsing. Here are the available options:
--sites
: Target Domain (e.g., .com, .org, .net)--dorks
: Number of Dorks (0 for all, default: 0)--threads
: Number of Threads (recommended range: 50-500)--pages
: Pages per Dork (between 25 and 100 at 25 increments)--rdork
: 'Y' if you want the dorks to be randomly selected, 'N' if not--S
: URL or .txt file--O
: Automatically perform SQL injection scanning
Example usage:
python url_seeker.py --sites .com --dorks 10 --threads 50 --pages 50 --rdork Y
python url_seeker.py --sites .com --dorks 10 --threads 50 --pages 50 --rdork Y --O
or
python url_seeker.py --O
If you enter --S url or .txt it scans for sql injection
python url_seeker.py --S url or .txt
python url_seeker.py
After the scan, you can choose from the following output options:
- Save current sorted URLs to a file.
- Save current unsorted URLs to a file.
- Print all unsorted URLs.
- Print all sorted URLs.
- SQL injection scanning sorted URLs.
- SQL injection scanning unsorted URLs.
Choose an option by entering the corresponding number.
Contributions are welcome! If you have any ideas, enhancements, or bug fixes, please submit a pull request.
This project is licensed under the MIT License.
Use this tool responsibly and in compliance with applicable laws. The author is not responsible for any misuse or damage caused by this tool.