Go-Dork : The Fastest Dork Scanner Written In Go

Go-Dork is the fastest dork scanner written in Go.

Install

  • Download a prebuilt binary from releases page, unpack and run! or
  • If you have go compiler installed and configured:

> GO111MODULE=on go get -v github.com/dwisiswant0/go-dork/…

Usage

  • Basic Usage

Simply, go-dork can be run with:

> go-dork -q “inurl:’…'”

  • Flags

> go-dork -h

This will display help for the tool. Here are all the switches it supports.

FlagDescription
-q/–querySearch query (required)
-e/–engineProvide search engine (default: Google)
(options: Google, Shodan, Bing, Duck, Yahoo, Ask)
-p/–pageSpecify number of pages (default: 1)
-H/–headerPass custom header to search engine
-x/–proxyUse proxy to surfing
-s/–silentSilent mode, prints only results in output
-nc/–no-colorDisable colored output results
  • Querying

> go-dork -q “inurl:…”

Queries can also be input with stdin

> cat dorks.txt | go-dork -p 5

  • Defining Engine

Search engine can be changed from the available engines: Google, Shodan, Bing, Duck, Yahoo, Ask. However, if the -e flag is not defined, it will use the Google search engine by default.

> go-dork -e bing -q “.php?id=”

This will do a search by the Bing engine.

  • Pagination

By default, go-dork selects the first page, you can customize using the -p flag.

> go-dork -q “intext:’jira'” -p 5

It will search sequentially from pages 1 to 5.

  • Adding Headers

Maybe you want to use a search filter on the Shodan engine, you can use custom headers to add cookies or other header parts.

> go-dork -q “org:’Target’ http.favicon.hash:116323821” \ –engine shodan -H “Cookie: …” -H “User-Agent: …”

  • Using Proxy

Using a proxy, this can also be useful if Google or other engines meet Captcha.

> go-dork -q “intitle:’BigIP'” -p 2 -x http://127.0.0.1:8989

  • Chained with other tools

If you want to chain the go-dork results with another tool, use the -s flag.

> go-dork -q “inurl:’/secure’ intext:’jira’ site:org” -s | nuclei -t workflows/jira-exploitaiton-workflow.yaml

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago