11/12 free views
Tool
CLI
Penetration Testing & Red Teaming

go-dork

by dwisiswant0

1.3Kstars
140forks
21watchers
Updated 3 months ago
About

go-dork is the fastest dork scanner written in Go that automates advanced search queries across multiple search engines for penetration testing.

The fastest dork scanner written in Go.

Primary Use Case

This tool is primarily used by penetration testers and red teamers to automate the discovery of vulnerable or interesting targets by leveraging dork queries on various search engines. It enables efficient information gathering by scraping search results from engines like Google, Shodan, Bing, and others, helping security professionals identify potential attack surfaces quickly.

Key Features
  • Supports multiple search engines including Google, Shodan, Bing, Duck, Yahoo, and Ask
  • Fast and efficient dork scanning implemented in Go
  • Customizable pagination to scrape multiple pages of search results
  • Ability to add custom HTTP headers for advanced querying
  • Proxy support to bypass search engine restrictions or Captchas
  • Silent mode for outputting only results, enabling easy chaining with other tools
  • Accepts queries via command line or stdin for flexible input
  • Open source with MIT license and active issue tracking

Installation

  • Download a prebuilt binary from the releases page on GitHub and run it
  • Alternatively, install via Go 1.15+ by running: GO111MODULE=on go install github.com/dwisiswant0/go-dork@latest

Usage

>_ go-dork -q "inurl:'...'"

Run a basic dork query using the default Google search engine

>_ go-dork -h

Display help and all available flags

>_ go-dork -q "intext:'jira'" -p 5

Search the first 5 pages for the query 'intext:jira'

>_ go-dork -e bing -q ".php?id="

Use Bing search engine to query '.php?id='

>_ cat dorks.txt | go-dork -p 5

Pipe multiple queries from a file and search 5 pages for each

>_ go-dork -q "org:'Target' http.favicon.hash:116323821" --engine shodan -H "Cookie: ..." -H "User-Agent: ..."

Use Shodan engine with custom headers for advanced filtering

>_ go-dork -q "intitle:'BigIP'" -p 2 -x http://127.0.0.1:8989

Search with a proxy to avoid Captchas or IP blocks

>_ go-dork -q "inurl:'/secure' intext:'jira' site:org" -s | nuclei -t workflows/jira-exploitaiton-workflow.yaml

Chain go-dork output silently to another tool (nuclei) for automated exploitation

Security Frameworks
Reconnaissance
Discovery
Initial Access
Usage Insights
  • Can be chained with Metasploit or custom exploit frameworks to automate exploitation after target discovery.
  • Useful for continuous security monitoring and reconnaissance in CI/CD pipelines to identify exposed assets early.
  • Proxy support enables stealthy scanning to evade detection and rate limiting during red team operations.
  • Silent mode facilitates integration into larger automated workflows or pipelines for efficient data processing.
  • Supports multiple search engines, increasing coverage and reducing blind spots during penetration testing.

Docs Take 2 Hours. AI Takes 10 Seconds.

Ask anything about go-dork. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.

This tool hasn't been indexed yet. Request indexing to enable AI chat.

Admin will review your request within 24 hours

Security Profile
Red Team85%
Blue Team35%
Purple Team60%
Details
LicenseMIT License
LanguageGo
Open Issues18
Topics
golang
dork-scanner
crawler
dorking
infosec
bugbounty
bugbounty-tool
google-dorking
google-dorks
vulnerability-scanners