Offensive Security Tool: D0rkerR3con Framework

Reading Time: 2 Minutes
D0rkerR3con Framework
D0rkerR3con Framework, developed by Chris “SaintDruG” Abou-Chabke from Black Hat Ethical Hacking, is a fast, offline Google Dorking toolkit that provides an interactive terminal interface (built with gum) for structured discovery of exposed targets.
See Also: So you want to be a hacker?
Offensive Security and Ethical Hacking Course
Who is It For?
- Red Teams
- Pentesters
- Advanced Offensive Operators
- Bug Bounty Hunters
- Security Engineers
Use this framework to quickly execute categorized Google dorks, review saved results, and organize recon findings without relying on external tools or web GUIs.
Outlaw Inspiration from RDR 2
This project is inspired by Arthur Morgan — the legendary outlaw from Red Dead Redemption 2. A man of few words but sharp instincts, Arthur wasn’t just a gun-for-hire — he was a watchful tactician, someone who read his enemies, moved in silence, and acted only when it mattered.
D0rkerR3con reflects that same spirit:
- Google Dorks = your long-range rifle — precise, silent, deadly
- Search Engine Recon = scouting from the hills, seeing without being seen
- Targets = corporate fortresses hiding secrets in plain sight
- You = the one who rides in with nothing but grit, wit, and a mission
“We can’t change what’s done, we can only move on.”
— Arthur Morgan
This tool wasn’t made for noise, but stealth in its core. It was made for operators, watchers, digital outlaws who understand the value of good Recon and quiet power. Built not for fame — but to get the job done.
Description
D0rkerR3con Framework automates structured Google Dork-based reconnaissance by leveraging a local, categorized database of over 68 high-impact dorks.
Each dork is categorized (e.g., Admin Panels, Exposed Files, Credentials, Debug Info, Secrets, etc.) and presented to the user via an interactive terminal UI powered by gum, allowing for quick multi-selection, clean execution, and full result organization per target domain.
The tool executes live Google searches in the default browser and cleanly stores each result for auditing, reporting, or re-use.
The Flow Behind It
The tool is fully modular. Each scan creates structured folders under results/, organized by domain.
1. Domain-Based Scanning
- You input a target domain (e.g., example.com)
- A clean directory is created at: results/example.com/
- All scan data is saved per session
2. Dork Selection via Gum UI
- Categories are presented in a scrollable, colorful Gum-based menu
- You select from:
Specific categories (e.g., Secrets, Cloud Buckets)
Show All to view all dorks (68+) - Multi-selection is supported
- Each dork has:
Title (for clarity)
Category (for grouping)
The raw Google Dork query
3. Live Execution in Browser
- Selected dorks are executed in your default browser
- Google search opens with site:example.com + the selected dork
- All URLs are saved locally
Files created:
results/example.com/
├── dorks_used.txt # Dorks run, with titles
├── raw_results.txt # All discovered links
└── export_example.com.html # (Optional) Pretty report
4. Optional HTML Report Generation
- After the scan, you’re asked if you want to export to HTML
- If yes, a clean export_example.com.html is created with:
Domain name
Scan date
Dorks used with titles
All discovered URLs
Framework credits
5. Revisiting Old Scans
- From the main menu, you can select View Previous Results
- Pick any domain from the results/ directory
- View the TXT output in terminal
- Re-export it into HTML if needed
You can also extend the database by editing dorkdb.json, adding your own titles, categories, and dork strings.
No APIs. No rate limits. No noise. Just clean, focused, high-signal recon.
Features
- Clean CLI interface with interactive gum powered menus
- Neon banner art and colorful terminal aesthetics
- 68+ categorized Google Dorks (Secrets, Admin, Files, Logs, etc.)
- Structured local database (dorkdb.json)
- Real-time search execution in browser (no APIs needed)
- Automatic result saving by domain
- Organized output: dorks_used.txt, raw_results.txt, and optional HTML reports
- Export results to styled HTML with timestamps and categories
- Revisit old scans and re-export previous results
- Lightweight and fast — no dependencies beyond core UNIX tools + gum + jq
- Installer scripts included for Kali Linux and macOS
- Easily extend the database with your own dorks and categories
Installation
git clone https://github.com/blackhatethicalhacking/D0rkerR3con-Framework.git
cd D0rkerR3con-Framework
Install Requirements
Option 1: Use Included Scripts
On Kali Linux
chmod +x install_kali_requirements.sh ./install_kali_requirements.sh
On macOS
chmod +x install_mac_requirements.sh ./install_mac_requirements.sh
Option 2: Manual Setup
Install the following manually if you prefer:
- bash
- gum
- jq
- xdg-open (Linux) or open (macOS)
- lolcat
Run the Tool
chmod +x D0rkerR3con.sh ./D0rkerR3con.sh
Disclaimer
This tool is for Educational and Authorized Testing Only. You are responsible for how you use it. Only run this framework on targets you have explicit permission to test.
Clone the repo from here: GitHub Link








