AI Dork Builder
Craft powerful search queries with 3,390+ prebuilt dorks, visual builder, and AI assistance
inurl:cve site:github.comCVE references on GitHub
intitle:"CVE" filetype:txtCVE text files
inurl:security-advisorySecurity advisory pages
intitle:"Security Advisory"Security advisory titles
inurl:vulnerability-reportVulnerability reports
"Security Bulletin" filetype:pdfSecurity bulletins PDF
intitle:"Vulnerability Disclosure"Vulnerability disclosures
inurl:advisories ext:txtAdvisory text files
"proof of concept" exploitPoC exploits
intitle:"Security Update" MicrosoftMicrosoft security updates
site:exploit-db.com inurl:exploitsExploit-DB exploits
"Remote Code Execution" vulnerabilityRCE vulnerabilities
"SQL Injection" advisorySQL injection advisories
"Cross-Site Scripting" CVEXSS CVEs
"Buffer Overflow" exploitBuffer overflow exploits
"Privilege Escalation" vulnerabilityPrivilege escalation vulns
"Authentication Bypass" advisoryAuth bypass advisories
"Directory Traversal" CVEDirectory traversal CVEs
"Denial of Service" advisoryDoS advisories
"Information Disclosure" vulnerabilityInfo disclosure vulns
site:security.microsoft.comMicrosoft security site
site:nvd.nist.govNVD database queries
site:cisa.gov alertCISA alerts
site:cert.org vulnerabilityCERT vulnerabilities
site:ubuntu.com/securityUbuntu security notices
site:redhat.com/securityRed Hat security
site:oracle.com/security-alertsOracle security alerts
site:cisco.com/securityCisco security advisories
site:apple.com/support/securityApple security updates
site:adobe.com/securityAdobe security bulletins
Extensive Library
Access 3,390+ professionally crafted dork queries across 14 categories.
Visual Builder
Build custom dorks with our intuitive drag-and-drop interface. Mix operators and keywords.
AI Assistant
Generate, explain, and optimize dorks using our AI-powered assistant.
Categories Overview
14 specialized categoriesLegal & Ethical Use Only
This tool is intended for authorized security research, penetration testing with proper authorization, and educational purposes only. Always ensure you have explicit permission before conducting any security assessments. Unauthorized access to computer systems is illegal.