Beginner Guide

This guide reproduces the workflow from the legacy GitBook so you can move from zero to a working combo. Follow the sections in order.

1. Craft High-Quality Dorks

Define Your Goal

  • Decide which niche you want to target (gaming, streaming, ecommerce, forums, and so on).
  • Write down 50–100 seed keywords that describe that niche. Use search engines or assistants like ChatGPT if you need inspiration.
// Sample keywords for a gaming theme
gta v stunt
gta v compilation
gta v money glitch

Page Types

Choose the file extensions that usually serve your target content. Common options are:

php
asp
aspx

Parameters

Parameters appear after the page type in a URL and narrow the query to the fields you want.

product
id
q
search
collection
category

Use the Built-in Dork Generator

  1. Open the dashboard and move to Utilities page
  2. Load the keyword, page type, and parameter files you prepared
  3. Create or upload your dork types, you can use the AI dork types builder if you don't feel creative
  4. Enter how many combinations to generate
  5. Download or save to the cloud your results

2. Run the Scraper/Parser

  1. Confirm that you have completed the Getting set up checklist
  2. Create a Scraper task
  3. Select threads (50–100 is a safe start for low-spec machines) and a timeout value that suits your proxies (ignore for Google Proxyless)
  4. Attach your freshly generated dork list and, if needed, a proxy list
  5. Choose the search engines you want to target inside the task settings (Google is the best, don't mix up with other engines)
  6. Start the task and monitor the results

3. Check for Vulnerabilities

  1. From the Scraper task locate the button Send results to and click it
  2. Select the filtered or antipublic results (only available if you have APlus), select your proxies or ignore if you use a VPN, pick your machine and adjust the settings as you please
  3. Pick the vulnerability type to test (SQL is the most common starting point).
  4. Run the task and repeat the process: click Send results to button, adjust and confirm

4. Exploit Vulnerabilities with the Dumper

  1. Once the new Dumper task has been created open the settings and adjust if needed (auto-dumper presets, default will be email:pass or auto-dehash option to automatically send your dumped lines to the dehasher once it's done)
  2. You'll see results appearing, injectables and dumps, the website's database will be dumped if it match your presets
  3. If you haven't enabled the auto-dehash option wait for the task to finish and click the download button in the dumps section next to the search bar, it'll create a dehasher task with those lines

5. Dehash the Results (or view them)

  1. If you haven't enabled the auto-dehash option, you can your dumped lines to the dehasher by clicking the download button (arrow icon) next to the search bar in the dumps section
  2. Start the task and wait for it to finish
  3. Download your results, antipublic will be available if you've bought and linked your APlus subscription

You now have a complete combo sourced, filtered, and decrypted through the DorkPlus solution. Continue exploring the other guides to manage upgrades, keep your machine healthy, and learn more about the software and its features.

On this page