GoogD0rker: use google dorks against a target domain – Penetration Testing

GoogD0rker

About

GoogD0rker is a tool for firing off google dorks against a target domain, it is purely for OSINT against a specific target domain. Designed for OSX, if you want to tweak it for Linux simply use sed: sed ‘s/open/newbrowser/g’ googd0rker > googd0rker-newbrowser. It is modified from goohak by crowdshield.

GoogD0rker-TXT

GoogD0rker-TXT was written by txt3rob has been merged into this repo to keep continuity, changes will be added to this over time to account for extra D0rks and features.

GoogD0rker-TXT – Setup

Install the pre-reqs which are the google library for python, also install python if you haven’t already. pip install google

GoogD0rker-TXT – Info

This will output all the google results for each of the tasks so you can hopefully find a vunerability. A 503 error means you need a new IP as google knows you’re up to something! This will output the results to files and then you can browse and see what you have found.

GoogD0rker-TXT – Usage

googD0rker-txt.py -d example.com

GoogD0rker Usage

/googd0rker.sh domain.com

Download

The post GoogD0rker: use google dorks against a target domain appeared first on Penetration Testing.

http://ift.tt/2v132t3 http://ift.tt/2aM8QhC

Anúncios

Deixe um comentário

Preencha os seus dados abaixo ou clique em um ícone para log in:

Logotipo do WordPress.com

Você está comentando utilizando sua conta WordPress.com. Sair / Alterar )

Imagem do Twitter

Você está comentando utilizando sua conta Twitter. Sair / Alterar )

Foto do Facebook

Você está comentando utilizando sua conta Facebook. Sair / Alterar )

Foto do Google+

Você está comentando utilizando sua conta Google+. Sair / Alterar )

Conectando a %s