The GoBing Tool is designed to perform web searches using Bing to find URLs that may be vulnerable to SQL injection or other vulnerabilities. It operates fully proxyless and is an open-source project intended for educational purposes only. Please use this tool responsibly and ethically.
- Performs web searches using Bing to find potential vulnerabilities.
- Operates fully proxyless.
- Supports concurrent searches with configurable settings.
- Filters out unwanted links based on a predefined list of forbidden words.
- Removes duplicate entries from the results.
- Uses colored console output for better readability.
To get started with the Bing Dork Search Tool, follow these steps:
-
Clone the repository:
git clone https://github.com/Pushkarup/GoBing.git cd GoBing
-
Install dependencies:
Ensure you have Go installed. Then, run:
go mod download
-
Create a
settings.ini
file:Create a file named
settings.ini
in the root directory with the following content:[settings] threads = 100 timeout = 60 MaxIdleConns = 200 MaxIdleConnsPerHost = 20
-
Prepare a dorks file:
Create a file containing your search dorks, one per line. For example,
dorks.txt
:inurl:admin.php inurl:login.asp
-
Run the tool:
Execute the tool by running:
go run bing.go
Follow the prompts to enter the dorks file name and the number of pages to search (maximum 15 pages).
Contributions to improve and enhance the project are welcome. To contribute:
- Fork the repository.
- Create a new branch (
git checkout -b feature/your-feature
). - Commit your changes (
git commit -m 'Add your feature'
). - Push to the branch (
git push origin feature/your-feature
). - Open a Pull Request.
This project is licensed under the MIT License. See the LICENSE file for details.
For any questions or suggestions, please contact Pushkar Upadhyay. thepushkar24@gmail.com