Go-Dork : The Fastest Dork Scanner Written In Go

Go-Dork is the fastest dork scanner written in Go.

Install

  • Download a prebuilt binary from releases page, unpack and run! or
  • If you have go compiler installed and configured:

> GO111MODULE=on go get -v github.com/dwisiswant0/go-dork/…

Usage

  • Basic Usage

Simply, go-dork can be run with:

> go-dork -q “inurl:’…'”

  • Flags

> go-dork -h

This will display help for the tool. Here are all the switches it supports.

FlagDescription
-q/–querySearch query (required)
-e/–engineProvide search engine (default: Google)
(options: Google, Shodan, Bing, Duck, Yahoo, Ask)
-p/–pageSpecify number of pages (default: 1)
-H/–headerPass custom header to search engine
-x/–proxyUse proxy to surfing
-s/–silentSilent mode, prints only results in output
-nc/–no-colorDisable colored output results
  • Querying

> go-dork -q “inurl:…”

Queries can also be input with stdin

> cat dorks.txt | go-dork -p 5

  • Defining Engine

Search engine can be changed from the available engines: Google, Shodan, Bing, Duck, Yahoo, Ask. However, if the -e flag is not defined, it will use the Google search engine by default.

> go-dork -e bing -q “.php?id=”

This will do a search by the Bing engine.

  • Pagination

By default, go-dork selects the first page, you can customize using the -p flag.

> go-dork -q “intext:’jira'” -p 5

It will search sequentially from pages 1 to 5.

  • Adding Headers

Maybe you want to use a search filter on the Shodan engine, you can use custom headers to add cookies or other header parts.

> go-dork -q “org:’Target’ http.favicon.hash:116323821” \ –engine shodan -H “Cookie: …” -H “User-Agent: …”

  • Using Proxy

Using a proxy, this can also be useful if Google or other engines meet Captcha.

> go-dork -q “intitle:’BigIP'” -p 2 -x http://127.0.0.1:8989

  • Chained with other tools

If you want to chain the go-dork results with another tool, use the -s flag.

> go-dork -q “inurl:’/secure’ intext:’jira’ site:org” -s | nuclei -t workflows/jira-exploitaiton-workflow.yaml

R K

Recent Posts

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

10 hours ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

10 hours ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

2 months ago

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

2 months ago

The Evolution of Online Finance Tools In a Tech-Driven World

In an era defined by technological innovation, the way people handle and understand money has…

2 months ago

A Complete Guide to Lenso.ai and Its Reverse Image Search Capabilities

The online world becomes more visually driven with every passing year. Images spread across websites,…

3 months ago