/GoogleDorker

GoogleDorker an advance level of cli based Google Dorking Tool

Primary LanguagePythonMIT LicenseMIT

GoogleDorker - An next level of Google Dorking tool For Cybersecurity Community Members

GoogleDorker is a command-line-based Google Dorking tool designed for bug hunters and penetration testers. It enables users to perform in-depth searches using Google Dorks to gather information about their targets. Utilizing Google's provided free APIs, GoogleDorker empowers cybersecurity professionals to conduct comprehensive reconnaissance and vulnerability assessment.

Features:

  • Google Dorking: Perform advanced searches using Google Dorks to find specific information on the web.
  • Bug Hunting: Uncover potential security vulnerabilities and misconfigurations.
  • Penetration Testing: Gather valuable intelligence for penetration testing engagements.
  • Free Google APIs: Utilize Google's free APIs to access powerful search capabilities.
  • Run Anywhere: Google Dorker ability run anywhere in any OS so no dependency required in you Operating system

Usage:

usage: dorker [-h] [-q QUERY] [-d DOMAIN] [-o OUTPUT]

A Powerfull Tool for google dorking

options:
  -h, --help            show this help message and exit
  -q QUERY, --query QUERY
                        [ALERT]:G oogle dorking query for your target
  -d DOMAIN, --domain DOMAIN
                        [ALERT]:Target name for Google dorking
  -o OUTPUT, --output OUTPUT
                        [ALERT]:File name to save the dorking results that are found

Installation for All users:

Method 1:

pip install dorker

git clone https://github.com/sanjai-AK47/GoogleDorker.git

dorker -h

Method 2:

git clone https://github.com/sanjai-AK47/GoogleDorker.git
pip install .
dorker -h

Information:

For all users preferred Method 1 installtions for easy installtion and configuration for your api's after a successfull Installation go to Dorker directory and located google-dorker.yaml file and configure your api keys as mentioned bellow

Configurations:

Configure your api keys as a syntax That I have mentioned below

Google-API: #Unlimited key are good

  - # API keys here

Google-CSE-ID: #Limited Id is enough

  - # your CSE id og goole

How to Get api keys and CSE-ID? Follow my steps here!:

  • Step-1: First login a google account in your browser
  • Step-2: Visit
  • here and create a search engine and choose all web option like below mentioned in images

Screenshot from 2023-10-07 07-52-40

  • Step-3: After Creating your successfull search engine it time to copy your cx value and paste in yaml in below Google-CSE-ID with the following syntax given by me

  • Step-4: After completing these all process now its time to grab your api keys of google here

  • Step-5: Press the get key button and create a new project with any name you want and click next , for example image in below Screenshot from 2023-10-07 07-57-25

  • Step-6: After creating and completing your api key is generated and press show key then copy it and paste in yaml file below Google-API with the following syntax given by me

  • Step-7: With the same process from step 4 you can get unlimited api keys so grab nearly 10 api keys for you efficiency of dorking it mean you can query 1000 times when u set nealy 10 api keys or more than that

Example Image of config yaml file

Screenshot from 2023-10-07 08-47-19

Ahh! Configuration are done now. NOW we will see how to use the dorker tool with a dorking query

Query Methods

Method1:

dorker -q "inurl:api site:bentley.com" --output google_dorks.txt

Method2:

dorker -d bentley.com -q inurl:api -o google_dorks.txt

Query Methods are depends on your's and I preferred Method 1 will be best for all to get better results and for complicated dorking queries

Issues:

Facing any issues? create a new issues and submit the issues you are facing in google dorker and that will be resolved as soon as possible

Support

Hey guys Im D.Sanjai Kumar Im the developer for these tools and try the other Tools in my repos for bug hunters and Show ur love ♥️ and give a ⭐ for this project Which will encourage me to develop tools like this and also another tools I have made for subdomain enumeration which best in results and modes check it out the Subdominator and its features and Thanks to all supporters! in advance