Go-Dork is the fastest dork scanner written in Go.
Install
> GO111MODULE=on go get -v github.com/dwisiswant0/go-dork/…
Usage
Simply, go-dork can be run with:
> go-dork -q “inurl:’…'”
> go-dork -h
This will display help for the tool. Here are all the switches it supports.
Flag | Description |
---|---|
-q/–query | Search query (required) |
-e/–engine | Provide search engine (default: Google) |
(options: Google, Shodan, Bing, Duck, Yahoo, Ask) | |
-p/–page | Specify number of pages (default: 1) |
-H/–header | Pass custom header to search engine |
-x/–proxy | Use proxy to surfing |
-s/–silent | Silent mode, prints only results in output |
-nc/–no-color | Disable colored output results |
> go-dork -q “inurl:…”
Queries can also be input with stdin
> cat dorks.txt | go-dork -p 5
Search engine can be changed from the available engines: Google, Shodan, Bing, Duck, Yahoo, Ask. However, if the -e
flag is not defined, it will use the Google search engine by default.
> go-dork -e bing -q “.php?id=”
This will do a search by the Bing engine.
By default, go-dork selects the first page, you can customize using the -p
flag.
> go-dork -q “intext:’jira'” -p 5
It will search sequentially from pages 1 to 5.
Maybe you want to use a search filter on the Shodan engine, you can use custom headers to add cookies or other header parts.
> go-dork -q “org:’Target’ http.favicon.hash:116323821” \ –engine shodan -H “Cookie: …” -H “User-Agent: …”
Using a proxy, this can also be useful if Google or other engines meet Captcha.
> go-dork -q “intitle:’BigIP'” -p 2 -x http://127.0.0.1:8989
If you want to chain the go-dork
results with another tool, use the -s
flag.
> go-dork -q “inurl:’/secure’ intext:’jira’ site:org” -s | nuclei -t workflows/jira-exploitaiton-workflow.yaml
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…