Godhands
Esports Pro
LEVEL 1
200 XP
Basic Usage
download link:
>git clone
cd go-dork
It's fairly simple, go-dork can be run with:
> go-dork -q "inurl:'...'"
Flags
> go-dork -h
This will display help for the tool. Here are all the switches it supports.
FlagDescription
-q/--querySearch query (required)
-e/--engineProvide search engine (default: Google)
(options: Google, Shodan, Bing, Duck, Yahoo, Ask)
-p/--pageSpecify number of pages (default: 1)
-H/--headerPass custom header to search engine
-x/--proxyUse proxy to surfing
-s/--silentSilent mode, prints only results in output
Querying
> go-dork -q "inurl:..."
Queries can also be input with stdin
> cat dorks.txt | go-dork -p 5
Defining engine
Search engine can be changed from the available engines: Google, Shodan, Bing, Duck, Yahoo, Ask. However, if the -e flag is not defined, it will use the Google search engine by default.
> go-dork -e bing -q ".php?id="
This will do a search by the Bing engine.
Pagination
By default, go-dork scrapes the first page, you can customize using the -p flag.
> go-dork -q "intext:'jira'" -p 5
It will search sequentially from pages 1 to 5.
Adding custom headers
Maybe you want to use a search filter on the Shodan engine, you can use custom headers to add cookies or other header parts.
> go-dork -q "org:'Target' http.favicon.hash:116323821" \
--engine shodan -H "Cookie: ..." -H "User-Agent: ..."
Using proxy
Using a proxy, this can also be useful if Google or other engines meet Captcha.
> go-dork -q "intitle:'BigIP'" -p 2 -x http://127.0.0.1:8989
Chained with other tools
If you want to chain the go-dork results with another tool, use the -s flag.
> cat dorks.txt | go-dork | pwntools
> go-dork -q "inurl:'/secure' intext:'jira' site:org" -s | nuclei -t workflows/jira-exploitaiton-workflow.yaml
Link:
[Paste your content here. Remove this line and one below!]
[DO NOT PASTE THE CONTENT ABOVE OR BELOW THE REPLY QUOTES]
download link:
You must upgrade your account or reply in the thread to view hidden text.
You must upgrade your account or reply in the thread to view hidden text.
It's fairly simple, go-dork can be run with:
> go-dork -q "inurl:'...'"
Flags
> go-dork -h
This will display help for the tool. Here are all the switches it supports.
FlagDescription
-q/--querySearch query (required)
-e/--engineProvide search engine (default: Google)
(options: Google, Shodan, Bing, Duck, Yahoo, Ask)
-p/--pageSpecify number of pages (default: 1)
-H/--headerPass custom header to search engine
-x/--proxyUse proxy to surfing
-s/--silentSilent mode, prints only results in output
Querying
> go-dork -q "inurl:..."
Queries can also be input with stdin
> cat dorks.txt | go-dork -p 5
Defining engine
Search engine can be changed from the available engines: Google, Shodan, Bing, Duck, Yahoo, Ask. However, if the -e flag is not defined, it will use the Google search engine by default.
> go-dork -e bing -q ".php?id="
This will do a search by the Bing engine.
Pagination
By default, go-dork scrapes the first page, you can customize using the -p flag.
> go-dork -q "intext:'jira'" -p 5
It will search sequentially from pages 1 to 5.
Adding custom headers
Maybe you want to use a search filter on the Shodan engine, you can use custom headers to add cookies or other header parts.
> go-dork -q "org:'Target' http.favicon.hash:116323821" \
--engine shodan -H "Cookie: ..." -H "User-Agent: ..."
Using proxy
Using a proxy, this can also be useful if Google or other engines meet Captcha.
> go-dork -q "intitle:'BigIP'" -p 2 -x http://127.0.0.1:8989
Chained with other tools
If you want to chain the go-dork results with another tool, use the -s flag.
> cat dorks.txt | go-dork | pwntools
> go-dork -q "inurl:'/secure' intext:'jira' site:org" -s | nuclei -t workflows/jira-exploitaiton-workflow.yaml
Link:
[Paste your content here. Remove this line and one below!]
[DO NOT PASTE THE CONTENT ABOVE OR BELOW THE REPLY QUOTES]