kriztalz's Security Tools

Generate Search Engine Dorks

About Our Search Engine Dorks Generator for OSINT Research

This free online OSINT tool helps threat intelligence researchers and security analysts create effective search queries (dorks) for specialized search engines. Simply enter your Open Source Intelligence (OSINT) search intent in natural language, and our cyber intelligence tool will generate the appropriate dork syntax for your digital investigations.

Key Features

  • Natural language to dork syntax conversion
  • Support for multiple security search engines
  • Detailed explanations of generated dorks
  • One-click copy functionality
  • 100% free and browser-based

What are Search Engine Dorks?

Search engine dorks are specialized search queries that use advanced syntax to find specific information. In cybersecurity and OSINT research, dorks help identify:

  • Vulnerable systems and applications
  • Exposed databases and sensitive information
  • Specific technologies or configurations
  • Geographic or organization-specific assets

Supported Search Engines

This tool currently supports generating dorks for:

  • Shodan: A search engine for Internet-connected devices
  • Censys: A search engine for finding Internet assets and infrastructure
  • Google: The world's most popular web search engine with powerful advanced search operators
  • FOFA: A search engine for discovering Internet-connected assets and services
  • ZoomEye: A search engine for cyberspace mapping and device intelligence

Sample Dorks

Curious what the generator produces? Here are examples inspired by popular searches like dork ai, fofa dork, and ZoomEye dork list for vulnerable mining configs exposed.

  • Shodan: ssl.jp.organization:"Proton AG" "openpgpkey" – surfaces mail servers in Japan that expose WKD endpoints.
  • Censys: services.http.response.body:"Admin login" AND location.country:DE – finds admin portals in Germany.
  • Google: site:github.com "pgp key fingerprint" – hunts for repositories discussing sample key or how to set it up.

You can copy these directly or let the tool craft variants tailored to your target geography or technology stack and correlate the hits with findings from the Domain Recon or GitHub Recon pages.

FAQ

Does the generator store my queries?
No. The phrasing you provide stays in memory only long enough to return the dork.
Can I export multiple dorks?
Use the copy button after each generation. Power users keep a note-taking app open and paste the dorks there for later automation.
What about Bing or other engines?
Drop a request if you rely on a specific platform and I will add templates.