Skip to content

GoogleDorks Toolkit is a powerful automated tool for google dorks, designed for pentration tester, ethical hackers and bug hunters to detect harmful security vulnerabilities using Google Dorks techniques. It has methods to bypass google captcha and search in a list of any possible program in wild.

SalehLardhi/google-dorks-toolkit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

GoogleDorks Toolkit

GoogleDorks Toolkit

GoogleDorks Toolkit is a Python script designed to help security researchers and penetration testers automate Google dorking for finding potential vulnerabilities and information about a target domain. The tool utilizes Google search queries, also known as Google hacks, to identify possible security issues and gather valuable information.

Features

  • Customizable Dorks: Users can provide their own list of dorks to be used in the Google search queries with huge list of default Google Dorks list.
  • Domain Search: The tool allows users to specify a target domain for the Google dorking process.
  • Results Output: Search results are saved to an output file, providing a convenient way to review and analyze the findings.
  • Detailed Results: Not only the vulnerable webapps and the dork, but also the auther and reference link of the dork for more information.
  • Vulnerability Disclosure and Bug Bounty Checker: Optional detection of vulnerabilities by searching for the identified domains in existing file OpenForReport.txt which own VDP or BBP programs to report legally.

Usage

Prerequisites

  • Python 3.x
  • Required Python packages: googlesearch, enum, argparse, pyfiglet

Installation

pip install googlesearch-python
pip install pyfiglet

Kali Linux

apt update; apt upgrade
git clone https://github.com/SalehLardhi/google-dorks-toolkit.git
cd google-dorks-toolkit

Termux

pkg update; pkg upgrade
git clone https://github.com/SalehLardhi/google-dorks-toolkit.git
cd google-dorks-toolkit

Command-line Arguments

- `-d`, `--domain`: Specify the target domain for Google dorking (required).
- `-n`, `--number_of_pages`: Set the number of pages to search (required).
- `-t`, `--time`: Specify the time between requests to avoid being blocked by Google (required).
- `-o`, `--output`: (Optional) Specify the output file name for saving the results.
- `--search`: (Optional) Search matched domains in OpenForReport.txt, note that the output should be yes or y only.
- `-l`, `--list`: (Optional) Add your own dorks list.

Example

python google_dorks_toolkit.py -d example.com -n 5 -t 5 -o results.txt --search yes

Developers

  • Saleh Lardhi
  • Zaid Frarah
  • Mohammed Mahros

Note

This tool is intended for educational and ethical use only. Use it responsibly and ensure compliance with applicable laws and regulations.

Disclaimer

The developers are not responsible for any misuse or damage caused by this script. Use it at your own risk.

About

GoogleDorks Toolkit is a powerful automated tool for google dorks, designed for pentration tester, ethical hackers and bug hunters to detect harmful security vulnerabilities using Google Dorks techniques. It has methods to bypass google captcha and search in a list of any possible program in wild.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages