Lierre is a Python-based tool for discovering potential SQL injection and XSS vulnerabilities in websites using Google dorks. It searches for URLs via Bing, filters them based on specific patterns, and tests for vulnerabilities with predefined payloads. Features include proxy support, randomized User-Agents, and domain blacklisting to avoid irrelevant or high-profile sites.
- Dork-Based Scanning: Queries Bing to find URLs matching user-defined dorks.
- Vulnerability Detection: Tests URLs for SQL injection and XSS vulnerabilities.
- Proxy Integration: Supports HTTP/HTTPS proxies for anonymized scanning.
- User-Agent Rotation: Randomizes User-Agent headers to evade detection.
- Blacklist Filtering: Skips domains like google.com and patterns like login pages.
- Error Logging: Records errors to a log file for troubleshooting.
- Result Export: Saves scan results and vulnerable URLs to a text file.
- Python 3.6 or later
- Python packages:
requestsbeautifulsoup4colorama
-
Clone or Download:
git clone https://github.com/lierree/Advanced-Dork-Scanner cd Advanced-Dork-Scanner -
Install Dependencies:
pip install requests beautifulsoup4 colorama
-
Set Up Input Files:
- Create
dorks.txtin the same directory asscanner.py, listing one dork per line (e.g.,inurl:login.php). - (Optional) Create
proxies.txtwith one proxy per line (e.g.,http://proxy:port).
- Create
-
Run the Tool:
python scanner.py
-
Respond to Prompts:
- Use proxy? (yes/no): Type
yesto use proxies fromproxies.txt, ornoto skip. - Select scan type (sql/xss): Enter
sqlfor SQL injection tests orxssfor XSS tests.
- Use proxy? (yes/no): Type
-
Output:
- URLs and vulnerabilities are shown in the console.
- Results, including dorks and vulnerable URLs with payloads, are saved to
results.txt. - Errors are logged to
errors.log.
$ python scanner.py
Lierre - Advanced Dork Scanner
MIT License. See LICENSE for details.
Use proxy? (yes/no): no
Select scan type (sql/xss): sql
[*] Loaded 3 dorks from dorks.txt.
[*] Scanning dork: inurl:login.php
[+] http://example.com/login.php?id=1
[!] SQL vuln: http://example.com/login.php?id=1 [']
[*] Results for 'inurl:login.php' saved to 'results.txt'. Vulnerable URLs: 1scanner.py: Core script for scanning and vulnerability testing.dorks.txt: Input file for dork queries (one per line).proxies.txt: (Optional) Input file for proxy addresses (one per line).results.txt: Output file for scan results.errors.log: Log file for errors.
- Dorks: Edit
dorks.txtto customize queries. Example:inurl:login.php inurl:admin.asp inurl:search.jsp - Proxies: Add proxies to
proxies.txt(e.g.,http://proxy:port). - Blacklist: Update
blacklist_domainsandblacklist_patternsinscanner.pyto filter domains or URLs. - Payloads: Modify
sql_payloadsandxss_payloadsinscanner.pyfor custom injection tests.
- SyntaxWarning: invalid escape sequence '\ ': Check for stray
\in code or files; replace with\\or fix. - Syntax Errors: Verify parentheses and f-strings in
scanner.pyare correct. - No Results: Ensure
dorks.txtexists with valid queries and check internet/proxy settings. - Colorama Issues: Confirm
coloramais installed andinit(autoreset=True)is in the script.
Lierre is for ethical security research and educational purposes only. The author is not liable for misuse or damage caused by this tool. Always obtain explicit permission before scanning or testing any system.