Icon
Trusted by 2,500+ Security Operators

The Unified Intelligence Powerhouse_

Consolidate your toolkit. Scrapers, Scanners, and Dumpers in one place.
Accelerate your workflow. Automated engine synchronization from day one.
Master the operational flow. Move from raw dorks to full dumps effortlessly.
Get started now
Operational Efficiency
Dork Parser Scanner Scraper Auto Dumper DB Explorer Dork Generator Env Scanner
Bluegrave Dashboard
LIVE PERFORMANCE
1.4M REQ/MIN

Powerful tools for every task

Your complete pentesting toolkit, fully automated and synchronized across every stage of the audit.

Dork Parser

The first step in any successful reconnaissance. Our parser utilizes **Heuristic URL Normalization** to process raw search results into high-quality, verified target lists with surgical precision. It automatically identifies and strips away tracking parameters, junk advertisements, and redundant session IDs.

  • High-speed Proxyless Scraping Engine
  • Regex-Based Content Filtering & Cleaning
  • Global Cross-Session Deduplication
System Activity +14.2% Efficiency
0
Targets Parsed
12k/s
Avg Speed
Engine: Heuristic Acquisition v2.4

Operational Workflow

1. Input

Click Upload Dorks to load your .txt list.

2. Settings

Set Threads (50-100 recommended) and select your Search Engine.
Dork Parser

Dork Generator

Advanced template-based dork builder. Uses a pure **Fisher-Yates Randomized Sampling Engine** to create highly unique search queries across millions of potential combinations. This ensures that your generated dorks are never in a predictable series, maximizing search engine coverage and evasion.

(kw) (pr) (pt) (dom) (sf) (cu)

The engine dynamically shuffles all provided lists before replacement to ensure zero repetition in the final set.

Generation Active Infinite Mix
0
Dorks Generated
100%
Uniqueness
Logic: Fisher-Yates Randomized Sampling
Configuration: Upload Keywords, Params, and Domains into their respective panels. The engine uses a 1:1 replacement logic but shuffles the pool for every single dork.
Dork Generator

Keyword Scraper

Expand your attack surface by scraping related keywords. Supports API suggestions for trending terms and live target crawling for site-specific intelligence.

Keyword Scraper

Vulnerability Finder

High-precision scanner for detecting SQL injection vulnerabilities. Features **Heuristic DBMS Fingerprinting** and **Proof-of-Life (PoL) Validation** to eliminate false positives. The scanner tests multiple injection levels and automatically adapts its payload strategy based on the target's response behavior.

Supports MySQL, MSSQL, Oracle, PostgreSQL, and MS Access with specialized bypass logic for each.

Audit Pulse 99% Success Rate
0
Targets Scanned
142
Vulns Identified
Engine: Proof-of-Life Validation Engine
1

Click Upload URLs. Supports direct parser results or manual imports.

2

Select Scan Level. Level 5 is the most exhaustive, identifying complex blind injections.

Scanner

Single Dumper

Exhaustive extraction for high-value targets. Once analyzed, the engine maps the entire database structure and performs a deep full-database dump into CSV format.

Dumper

Auto Dumper

Mass unattended extraction engine. Utilizes **Recursive Schema Discovery** to automatically map and dump entire databases across hundreds of sites simultaneously. Features advanced **WAF-Bypass Payload Obfuscation** and "Smart Bypass" logic to evade security filters and ensure maximum data retrieval.

Mass Extraction High Throughput
0
Active Workers
250+
Concurrent Sites
Logic: Recursive Schema Discovery Protocol

Technical Insight

The No Cast setting removes conversion logic from payloads, significantly improving evasion against modern WAFs and increasing compatibility with Legacy MySQL databases.

Dashboard
Settings

Env Scanner

Mass configuration exposure detector. Locates .env, wp-config, and cloud credentials across thousands of targets using a worker-per-domain model.

FAST AND ACCURATE
Parallel Scanner