A powerful web-based tool for advanced Google search queries and subdomain discovery, designed specifically for cybersecurity research and bug bounty hunting. Perfect for discovering hidden parameters, endpoints, and sensitive information during security assessments.
- Dork Query Builder: Create complex Google dork queries with ease
- Parameter Discovery: Find hidden API endpoints and parameters
- Subdomain Finder: Discover subdomains of target websites
- Interactive UI: User-friendly interface with real-time particle animation
- Responsive Design: Works seamlessly on all devices
Visit Google Dork Scanner to try it out!
Hidden Parameters and Endpoints Discovery
-
Finding API Endpoints:
site:target.com filetype:php inurl:"api" site:target.com filetype:js inurl:"api" intext:"endpoint"Reveals PHP files handling API calls and JavaScript files containing API references
-
Discovering Hidden Parameters:
site:target.com inurl:"?id=" site:target.com inurl:"?action=" OR inurl:"?cmd="Uncovers parameters that might be vulnerable to IDOR or command injection
-
Locating Admin Interfaces:
site:target.com inurl:"admin" OR inurl:"debug" site:target.com inurl:"?role=admin" OR inurl:"?privilege=admin"Finds potential admin panels and privilege-related parameters
-
API Documentation Files:
site:target.com filetype:json inurl:"swagger" site:target.com filetype:yaml inurl:"api-docs"Discovers Swagger/OpenAPI documentation exposing API details
-
Debug and Development Endpoints:
site:target.com inurl:"debug" OR inurl:"test" OR inurl:"dev" site:target.com intext:"debug=true" OR intext:"debug=1"Finds development and debugging interfaces
-
Configuration and Sensitive Files:
site:target.com ext:conf OR ext:config OR ext:cfg site:target.com filetype:env OR filetype:iniLocates configuration files that might contain sensitive data
-
Legacy and Backup Files:
site:target.com ext:bak OR ext:old OR ext:backup site:target.com inurl:backup OR inurl:old intext:passwordDiscovers backup files that might contain sensitive information
- Enter the target domain (e.g.,
example.com) - Click "Find Subdomains"
- The tool will search for all accessible subdomains
- Always obtain proper authorization before scanning any target
- Follow responsible disclosure practices
- Respect the target's security policies and terms of service
- Do not use this tool for malicious purposes
- Report findings through appropriate channels
This tool is designed for security researchers and bug bounty hunters to assist in authorized security assessments. Users are responsible for ensuring they have proper authorization before scanning any target. The developers are not responsible for any misuse or damage caused by this tool.
Contributions are welcome! Please feel free to submit a Pull Request.
This project is licensed under the MIT License. This means you can freely use, modify, distribute, and sell this software and its documentation. The only requirement is that you include the original copyright notice and license terms in any copy of the software/source. See the LICENSE file for the full license text.
Made with ❤️ by Tipu
Note: This tool is for educational and authorized testing purposes only. Always ensure you have proper authorization before testing any target.