go-dork
by dwisiswant0
go-dork is the fastest dork scanner written in Go that automates advanced search queries across multiple search engines for penetration testing.
The fastest dork scanner written in Go.
Primary Use Case
This tool is primarily used by penetration testers and red teamers to automate the discovery of vulnerable or interesting targets by leveraging dork queries on various search engines. It enables efficient information gathering by scraping search results from engines like Google, Shodan, Bing, and others, helping security professionals identify potential attack surfaces quickly.
- Supports multiple search engines including Google, Shodan, Bing, Duck, Yahoo, and Ask
- Fast and efficient dork scanning implemented in Go
- Customizable pagination to scrape multiple pages of search results
- Ability to add custom HTTP headers for advanced querying
- Proxy support to bypass search engine restrictions or Captchas
- Silent mode for outputting only results, enabling easy chaining with other tools
- Accepts queries via command line or stdin for flexible input
- Open source with MIT license and active issue tracking
Installation
- Download a prebuilt binary from the releases page on GitHub and run it
- Alternatively, install via Go 1.15+ by running: GO111MODULE=on go install github.com/dwisiswant0/go-dork@latest
Usage
>_ go-dork -q "inurl:'...'"Run a basic dork query using the default Google search engine
>_ go-dork -hDisplay help and all available flags
>_ go-dork -q "intext:'jira'" -p 5Search the first 5 pages for the query 'intext:jira'
>_ go-dork -e bing -q ".php?id="Use Bing search engine to query '.php?id='
>_ cat dorks.txt | go-dork -p 5Pipe multiple queries from a file and search 5 pages for each
>_ go-dork -q "org:'Target' http.favicon.hash:116323821" --engine shodan -H "Cookie: ..." -H "User-Agent: ..."Use Shodan engine with custom headers for advanced filtering
>_ go-dork -q "intitle:'BigIP'" -p 2 -x http://127.0.0.1:8989Search with a proxy to avoid Captchas or IP blocks
>_ go-dork -q "inurl:'/secure' intext:'jira' site:org" -s | nuclei -t workflows/jira-exploitaiton-workflow.yamlChain go-dork output silently to another tool (nuclei) for automated exploitation
- Can be chained with Metasploit or custom exploit frameworks to automate exploitation after target discovery.
- Useful for continuous security monitoring and reconnaissance in CI/CD pipelines to identify exposed assets early.
- Proxy support enables stealthy scanning to evade detection and rate limiting during red team operations.
- Silent mode facilitates integration into larger automated workflows or pipelines for efficient data processing.
- Supports multiple search engines, increasing coverage and reducing blind spots during penetration testing.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about go-dork. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
This tool hasn't been indexed yet. Request indexing to enable AI chat.
Admin will review your request within 24 hours
Related Tools
Awesome-Hacking
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
hackingtool
Z4nzu/hackingtool
ALL IN ONE Hacking Tool For Hackers
mitmproxy
mitmproxy/mitmproxy
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
sqlmap
sqlmapproject/sqlmap
Automatic SQL injection and database takeover tool

metasploit-framework
rapid7/metasploit-framework
Metasploit Framework
h4cker
The-Art-of-Hacking/h4cker
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security, vulnerability research, exploit development, reverse engineering, and more. 🔥 Also check: https://hackertraining.org
