Offensive Security Tool: D0rkerR3con Framework

by | Jan 30, 2026 | Tools, Tools by BHEH

Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon

Reading Time: 2 Minutes

D0rkerR3con Framework

D0rkerR3con Framework, developed by Chris “SaintDruG” Abou-Chabke from Black Hat Ethical Hacking, is a fast, offline Google Dorking toolkit that provides an interactive terminal interface (built with gum) for structured discovery of exposed targets.

See Also: So you want to be a hacker?
Offensive Security and Ethical Hacking Course

Who is It For?

  • Red Teams
  • Pentesters
  • Advanced Offensive Operators
  • Bug Bounty Hunters
  • Security Engineers

Use this framework to quickly execute categorized Google dorks, review saved results, and organize recon findings without relying on external tools or web GUIs.

Outlaw Inspiration from RDR 2

This project is inspired by Arthur Morgan — the legendary outlaw from Red Dead Redemption 2. A man of few words but sharp instincts, Arthur wasn’t just a gun-for-hire — he was a watchful tactician, someone who read his enemies, moved in silence, and acted only when it mattered.

D0rkerR3con reflects that same spirit:

  • Google Dorks = your long-range rifle — precise, silent, deadly
  • Search Engine Recon = scouting from the hills, seeing without being seen
  • Targets = corporate fortresses hiding secrets in plain sight
  • You = the one who rides in with nothing but grit, wit, and a mission

“We can’t change what’s done, we can only move on.”
— Arthur Morgan

This tool wasn’t made for noise, but stealth in its core. It was made for operatorswatchersdigital outlaws who understand the value of good Recon and quiet power. Built not for fame — but to get the job done.

Description

D0rkerR3con Framework automates structured Google Dork-based reconnaissance by leveraging a local, categorized database of over 68 high-impact dorks.

Each dork is categorized (e.g., Admin Panels, Exposed Files, Credentials, Debug Info, Secrets, etc.) and presented to the user via an interactive terminal UI powered by gum, allowing for quick multi-selection, clean execution, and full result organization per target domain.

The tool executes live Google searches in the default browser and cleanly stores each result for auditing, reporting, or re-use.

 

The Flow Behind It

The tool is fully modular. Each scan creates structured folders under results/, organized by domain.

 

1. Domain-Based Scanning

  • You input a target domain (e.g., example.com)
  • A clean directory is created at: results/example.com/
  • All scan data is saved per session

 

2. Dork Selection via Gum UI

  • Categories are presented in a scrollable, colorful Gum-based menu
  • You select from:
    Specific categories (e.g., Secrets, Cloud Buckets)
    Show All to view all dorks (68+)
  • Multi-selection is supported
  • Each dork has:
    Title (for clarity)
    Category (for grouping)
    The raw Google Dork query

 

3. Live Execution in Browser

  • Selected dorks are executed in your default browser
  • Google search opens with site:example.com + the selected dork
  • All URLs are saved locally

Files created:

results/example.com/
├── dorks_used.txt # Dorks run, with titles
├── raw_results.txt # All discovered links
└── export_example.com.html # (Optional) Pretty report

 

4. Optional HTML Report Generation

  • After the scan, you’re asked if you want to export to HTML
  • If yes, a clean export_example.com.html is created with:
    Domain name
    Scan date
    Dorks used with titles
    All discovered URLs
    Framework credits

 

5. Revisiting Old Scans

  • From the main menu, you can select View Previous Results
  • Pick any domain from the results/ directory
  • View the TXT output in terminal
  • Re-export it into HTML if needed

 

You can also extend the database by editing dorkdb.json, adding your own titles, categories, and dork strings.

No APIs. No rate limits. No noise. Just clean, focused, high-signal recon.

Features

  • Clean CLI interface with interactive gum powered menus
  • Neon banner art and colorful terminal aesthetics
  • 68+ categorized Google Dorks (Secrets, Admin, Files, Logs, etc.)
  • Structured local database (dorkdb.json)
  • Real-time search execution in browser (no APIs needed)
  • Automatic result saving by domain
  • Organized output: dorks_used.txt, raw_results.txt, and optional HTML reports
  • Export results to styled HTML with timestamps and categories
  • Revisit old scans and re-export previous results
  • Lightweight and fast — no dependencies beyond core UNIX tools + gum + jq
  • Installer scripts included for Kali Linux and macOS
  • Easily extend the database with your own dorks and categories

 

Installation

git clone https://github.com/blackhatethicalhacking/D0rkerR3con-Framework.git

cd D0rkerR3con-Framework

 

Install Requirements

 

Option 1: Use Included Scripts

On Kali Linux

chmod +x install_kali_requirements.sh
./install_kali_requirements.sh

On macOS

chmod +x install_mac_requirements.sh
./install_mac_requirements.sh

Option 2: Manual Setup

Install the following manually if you prefer:

  • bash
  • gum
  • jq
  • xdg-open (Linux) or open (macOS)
  • lolcat

 

Run the Tool

chmod +x D0rkerR3con.sh
./D0rkerR3con.sh

 

Disclaimer

This tool is for Educational and Authorized Testing Only. You are responsible for how you use it. Only run this framework on targets you have explicit permission to test.

 

Clone the repo from here: GitHub Link

Merch

Recent Tools

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This