Instead of using dorks to attack, developers should use them to :

Get a breakdown of the used for security auditing?

The file is a collection of tools and search strings (dorks) used to identify websites potentially vulnerable to SQL Injection (SQLi) .

: Automates queries like inurl:index.php?id= to find targets.