uDork – Google Hacking Tool

uDork is a script written in Python that uses advanced Google search techniques to obtain sensitive information in files or directories, find IoT devices, detect versions of web applications, and so on.

It does NOT make attacks against any server, it only uses predefined dorks and/or official lists from exploit-db.com (Google Hacking Database: https://www.exploit-db.com/google-hacking-database).

You need to have goop installed

pip3 install goop

Download & Install?

$ git clone https://github.com/m3n0sd0n4ld/uDork
$ cd uDork
– Open the file and write inside this line:

cookie = ‘YOUR FACEBOOK COOKIES HERE’

$ python3 uDork.py -h

Important

  • For the tool to work, you must configure uDork with your Facebook cookie in the file cookie.py.
  • You must also be logged in to Facebook on the computer you are using uDork WITHOUT logging out.

Steps to obtain the cookie and configure the cookie

  • Login to facebook.com
  • Press in your browser control + shift + K (Firefox) o control + shift + J (Google Chrome) to go to console.
  • Write document.cookie in the console and copy the cookies “c_user = content” and “xs = content” to the variable “cookie” inside the file “cookie.py””

cookie = ‘c_user=XXXXXX; xs=XXXXXX’

Note: If the “xs” cookie does not appear, follow these steps.

  • Save and remember, you must NOT log out of Facebook or you will have to do these steps again.

Use

  • Menu
  • Example of searching pdf files
  • Dorks listing
  • Example of use Dorks Massive
R K

Recent Posts

How OpenClaw Works

Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive…

5 days ago

How to Use the Linux find Command to Locate Files Like a Pro

Managing files efficiently is a core skill for anyone working in Linux, whether you're a…

1 week ago

How to Check Open Ports in Linux Using netstat, ss, and lsof

Open ports act as communication endpoints between your Linux system and the outside world. Every…

1 week ago

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

1 week ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

1 week ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

3 months ago