Recon Tool: go-dork

by | Feb 2, 2024 | Tools

Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon

Reading Time: 2 Minutes

go-dork

go-dork by dwisiswant0 is a is a powerful and efficient command-line tool written in the Go programming language, designed to be the fastest dork scanner available. It streamlines the process of conducting advanced Google dork queries, making it an invaluable resource for security researchers, bug bounty hunters and penetration testers.

There are also various search engines supported by go-dork, including Google, Shodan, Bing, Duck, Yahoo and Ask.

See Also: A Practical Guide to Hacking Techniques for finding Top Bugs.
The Bug Bounty Hunting Course

Install

  • Download a prebuilt binary from releases page, unpack and run! or
  • If you have Go 1.15+ compiler installed and configured:

> GO111MODULE=on go install dw1.io/go-dork@latest

 

Usage

Basic Usage

It’s fairly simple, go-dork can be run with:

> go-dork -q "inurl:'...'"

 

Flags

go-dork -h

This will display help for the tool. Here are all the switches it supports.

FlagDescription
-q/–querySearch query (required)
-e/–engineProvide search engine (default: Google)
 (options: Google, Shodan, Bing, Duck, Yahoo, Ask)
-p/–pageSpecify number of pages (default: 1)
-H/–headerPass custom header to search engine
-x/–proxyUse proxy to surfing
-s/–silentSilent mode, prints only results in output

Querying

> go-dork -q "inurl:..."

Queries can also be input with stdin

cat dorks.txt | go-dork -p 5

 

Defining engine

Search engine can be changed from the available engines: Google, Shodan, Bing, Duck, Yahoo, Ask. However, if the -e flag is not defined, it will use the Google search engine by default.

> go-dork -e bing -q ".php?id="

This will do a search by the Bing engine.

 

Pagination

By default, go-dork scrapes the first page, you can customize using the -p flag.

go-dork -q "intext:'jira'" -p 5

It will search sequentially from pages 1 to 5.

Adding custom headers

Maybe you want to use a search filter on the Shodan engine, you can use custom headers to add cookies or other header parts.

> go-dork -q "org:'Target' http.favicon.hash:116323821" \
--engine shodan -H "Cookie: ..." -H "User-Agent: ..."

Using proxy

Using a proxy, this can also be useful if Google or other engines meet Captcha.

go-dork -q "intitle:'BigIP'" -p 2 -x http://127.0.0.1:8989

 

Chained with other tools

If you want to chain the go-dork results with another tool, use the -s flag.

> cat dorks.txt | go-dork | pwntools
> go-dork -q "inurl:'/secure' intext:'jira' site:org" -s | nuclei -t workflows/jira-exploitaiton-workflow.yaml
 

Clone the repo from here: GitHub Link

 

Merch

Recent Tools

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This