ExploitCraft

Google, Shodan, and GitHub dork generator for pentesters and bug bounty hunters

12
1
69% credibility
Found Mar 22, 2026 at 12 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

gitdork generates ready-to-use search queries for Google, Shodan, and GitHub to help security researchers identify exposed secrets, sensitive files, and misconfigurations on domains or repositories.

How It Works

1
🔍 Discover gitdork

You learn about a simple tool that helps spot hidden security weak spots on websites or online projects by creating smart search ideas.

2
💻 Get it ready

You quickly add the tool to your computer so it's easy to use anytime.

3
🚀 Pick your target

You open the tool and enter the name of a website or online project you want to check.

4
🎯 Choose what to hunt

You select the types of issues to focus on, like exposed secrets or open folders, to make your search targeted.

5
Get search ideas

The tool instantly creates a list of ready-to-use searches grouped nicely for you.

6
🔗 Click to search

You see clickable links that take you straight to search results on familiar sites.

🏆 Spot the issues

You easily find potential weak spots and feel empowered to make things safer.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 12 to 12 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is gitdork?

gitdork is a Python CLI tool that generates ready-to-run dork queries for Google, Shodan, and GitHub searches from a domain or repo URL—like gitdorker py github on steroids. Feed it example.com or ExploitCraft/ReconNinja, pick categories like secrets or misconfigs, and get clickable queries targeting API keys, .env leaks, exposed ports, or login panels. It even pulls GitHub metadata for tech-specific dorks, such as google github actions auth v3 or shodan google dork variants, solving the tedium of manual google fu and shodan recon.

Why is it gaining traction?

Unlike basic dork lists, gitdork tailors queries to your target with engine filtering (google only, say), category combos, and outputs in Rich terminal, JSON, or Markdown—ideal for bug bounty reports. The --enrich flag detects stacks like Kubernetes or Laravel for precise hits, like google github actions get secretmanager secrets v2. Grouping by category or engine, plus PyPI install, makes it a quick recon accelerator over scattered google shodan io cheatsheets.

Who should use this?

Pentesters scripting subdomain enum or misconfig hunts, bug bounty hunters targeting google github alternative repos, or OSINT devs chasing shodan google chrome extension leaks. Great for red teamers prepping google github course styleguide audits or shodan google maps infra scans.

Verdict

Grab it for fast dorking—solid CLI, docs, and MIT license make it production-ready despite 12 stars and 0.699999988079071% credibility score signaling early maturity. Test on your own targets; pair with bounty tools like envleaks for real wins.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.