Go-Dork is the fastest dork scanner written in Go.
Install
> GO111MODULE=on go get -v github.com/dwisiswant0/go-dork/…
Usage
Simply, go-dork can be run with:
> go-dork -q “inurl:’…'”
> go-dork -h
This will display help for the tool. Here are all the switches it supports.
Flag | Description |
---|---|
-q/–query | Search query (required) |
-e/–engine | Provide search engine (default: Google) |
(options: Google, Shodan, Bing, Duck, Yahoo, Ask) | |
-p/–page | Specify number of pages (default: 1) |
-H/–header | Pass custom header to search engine |
-x/–proxy | Use proxy to surfing |
-s/–silent | Silent mode, prints only results in output |
-nc/–no-color | Disable colored output results |
> go-dork -q “inurl:…”
Queries can also be input with stdin
> cat dorks.txt | go-dork -p 5
Search engine can be changed from the available engines: Google, Shodan, Bing, Duck, Yahoo, Ask. However, if the -e
flag is not defined, it will use the Google search engine by default.
> go-dork -e bing -q “.php?id=”
This will do a search by the Bing engine.
By default, go-dork selects the first page, you can customize using the -p
flag.
> go-dork -q “intext:’jira'” -p 5
It will search sequentially from pages 1 to 5.
Maybe you want to use a search filter on the Shodan engine, you can use custom headers to add cookies or other header parts.
> go-dork -q “org:’Target’ http.favicon.hash:116323821” \ –engine shodan -H “Cookie: …” -H “User-Agent: …”
Using a proxy, this can also be useful if Google or other engines meet Captcha.
> go-dork -q “intitle:’BigIP'” -p 2 -x http://127.0.0.1:8989
If you want to chain the go-dork
results with another tool, use the -s
flag.
> go-dork -q “inurl:’/secure’ intext:’jira’ site:org” -s | nuclei -t workflows/jira-exploitaiton-workflow.yaml
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…
Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…
Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…
Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…