AI-Powered OSINT Search Intelligence

AI Dork Builder

Craft powerful search queries with 3,390+ prebuilt dorks, visual builder, and AI assistance

3,390+
Prebuilt Dorks
14
Categories
10+
Search Engines
AI
Powered
Showing 1 - 30 of 3,390 dorks
โš ๏ธAdvisories & Vulnerabilities
inurl:cve site:github.com

CVE references on GitHub

โš ๏ธAdvisories & Vulnerabilities
intitle:"CVE" filetype:txt

CVE text files

โš ๏ธAdvisories & Vulnerabilities
inurl:security-advisory

Security advisory pages

โš ๏ธAdvisories & Vulnerabilities
intitle:"Security Advisory"

Security advisory titles

โš ๏ธAdvisories & Vulnerabilities
inurl:vulnerability-report

Vulnerability reports

โš ๏ธAdvisories & Vulnerabilities
"Security Bulletin" filetype:pdf

Security bulletins PDF

โš ๏ธAdvisories & Vulnerabilities
intitle:"Vulnerability Disclosure"

Vulnerability disclosures

โš ๏ธAdvisories & Vulnerabilities
inurl:advisories ext:txt

Advisory text files

โš ๏ธAdvisories & Vulnerabilities
"proof of concept" exploit

PoC exploits

โš ๏ธAdvisories & Vulnerabilities
intitle:"Security Update" Microsoft

Microsoft security updates

โš ๏ธAdvisories & Vulnerabilities
site:exploit-db.com inurl:exploits

Exploit-DB exploits

โš ๏ธAdvisories & Vulnerabilities
"Remote Code Execution" vulnerability

RCE vulnerabilities

โš ๏ธAdvisories & Vulnerabilities
"SQL Injection" advisory

SQL injection advisories

โš ๏ธAdvisories & Vulnerabilities
"Cross-Site Scripting" CVE

XSS CVEs

โš ๏ธAdvisories & Vulnerabilities
"Buffer Overflow" exploit

Buffer overflow exploits

โš ๏ธAdvisories & Vulnerabilities
"Privilege Escalation" vulnerability

Privilege escalation vulns

โš ๏ธAdvisories & Vulnerabilities
"Authentication Bypass" advisory

Auth bypass advisories

โš ๏ธAdvisories & Vulnerabilities
"Directory Traversal" CVE

Directory traversal CVEs

โš ๏ธAdvisories & Vulnerabilities
"Denial of Service" advisory

DoS advisories

โš ๏ธAdvisories & Vulnerabilities
"Information Disclosure" vulnerability

Info disclosure vulns

โš ๏ธAdvisories & Vulnerabilities
site:security.microsoft.com

Microsoft security site

โš ๏ธAdvisories & Vulnerabilities
site:nvd.nist.gov

NVD database queries

โš ๏ธAdvisories & Vulnerabilities
site:cisa.gov alert

CISA alerts

โš ๏ธAdvisories & Vulnerabilities
site:cert.org vulnerability

CERT vulnerabilities

โš ๏ธAdvisories & Vulnerabilities
site:ubuntu.com/security

Ubuntu security notices

โš ๏ธAdvisories & Vulnerabilities
site:redhat.com/security

Red Hat security

โš ๏ธAdvisories & Vulnerabilities
site:oracle.com/security-alerts

Oracle security alerts

โš ๏ธAdvisories & Vulnerabilities
site:cisco.com/security

Cisco security advisories

โš ๏ธAdvisories & Vulnerabilities
site:apple.com/support/security

Apple security updates

โš ๏ธAdvisories & Vulnerabilities
site:adobe.com/security

Adobe security bulletins

Extensive Library

Access 3,390+ professionally crafted dork queries across 14 categories.

Visual Builder

Build custom dorks with our intuitive drag-and-drop interface. Mix operators and keywords.

AI Assistant

Generate, explain, and optimize dorks using our AI-powered assistant.

Categories Overview

14 specialized categories
โš ๏ธ
Advisories & Vulnerabilities
300 dorks
โŒ
Error Messages
350 dorks
๐Ÿ“„
Files Containing Juicy Info
350 dorks
๐Ÿ”‘
Files Containing Passwords
300 dorks
๐Ÿ‘ค
Files Containing Usernames
250 dorks
๐Ÿฆถ
Footholds
250 dorks
๐ŸŒ
Network or Vulnerability Data
230 dorks
๐Ÿ”
Pages Containing Login Portals
230 dorks
๐Ÿ“
Sensitive Directories
200 dorks
๐Ÿ›’
Sensitive Online Shopping Info
160 dorks
๐Ÿ“ท
Various Online Devices
200 dorks
๐Ÿ“
Vulnerable Files
190 dorks
๐Ÿ–ฅ๏ธ
Vulnerable Servers
190 dorks
๐Ÿ”
Web Server Detection
190 dorks

Legal & Ethical Use Only

This tool is intended for authorized security research, penetration testing with proper authorization, and educational purposes only. Always ensure you have explicit permission before conducting any security assessments. Unauthorized access to computer systems is illegal.