GoogD0rker is a tool for firing off google dorks against a target domain, it is purely for OSINT against a specific target domain. Designed for OSX, if you want to tweak it for Linux simply use sed: sed ‘s/open/newbrowser/g’ googd0rker > googd0rker-newbrowser. It is modified from goohak by crowdshield.
GoogD0rker-TXT was written by txt3rob has been merged into this repo to keep continuity, changes will be added to this over time to account for extra D0rks and features.
GoogD0rker-TXT – Setup
Install the pre-reqs which are the google library for python, also install python if you haven’t already. pip install google
GoogD0rker-TXT – Info
This will output all the google results for each of the tasks so you can hopefully find a vunerability. A 503 error means you need a new IP as google knows you’re up to something! This will output the results to files and then you can browse and see what you have found.
GoogD0rker-TXT – Usage
googD0rker-txt.py -d example.com
The post GoogD0rker: use google dorks against a target domain appeared first on Penetration Testing.