Skip to content

A powerful web-based tool for advanced Google search queries and subdomain discovery, designed specifically for cybersecurity research and bug bounty hunting. Perfect for discovering hidden parameters, endpoints, and sensitive information during security assessments.

License

Notifications You must be signed in to change notification settings

baradatipu/dork-scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 

Repository files navigation

Google Dork Scanner 🔍

A powerful web-based tool for advanced Google search queries and subdomain discovery, designed specifically for cybersecurity research and bug bounty hunting. Perfect for discovering hidden parameters, endpoints, and sensitive information during security assessments.

🌟 Features

  • Dork Query Builder: Create complex Google dork queries with ease
  • Parameter Discovery: Find hidden API endpoints and parameters
  • Subdomain Finder: Discover subdomains of target websites
  • Interactive UI: User-friendly interface with real-time particle animation
  • Responsive Design: Works seamlessly on all devices

🚀 Live Demo

Visit Google Dork Scanner to try it out!

🔧 Advanced Usage Examples

Hidden Parameters and Endpoints Discovery

  1. Finding API Endpoints:

    site:target.com filetype:php inurl:"api"
    site:target.com filetype:js inurl:"api" intext:"endpoint"
    

    Reveals PHP files handling API calls and JavaScript files containing API references

  2. Discovering Hidden Parameters:

    site:target.com inurl:"?id="
    site:target.com inurl:"?action=" OR inurl:"?cmd="
    

    Uncovers parameters that might be vulnerable to IDOR or command injection

  3. Locating Admin Interfaces:

    site:target.com inurl:"admin" OR inurl:"debug"
    site:target.com inurl:"?role=admin" OR inurl:"?privilege=admin"
    

    Finds potential admin panels and privilege-related parameters

  4. API Documentation Files:

    site:target.com filetype:json inurl:"swagger"
    site:target.com filetype:yaml inurl:"api-docs"
    

    Discovers Swagger/OpenAPI documentation exposing API details

Additional Security Research

  1. Debug and Development Endpoints:

    site:target.com inurl:"debug" OR inurl:"test" OR inurl:"dev"
    site:target.com intext:"debug=true" OR intext:"debug=1"
    

    Finds development and debugging interfaces

  2. Configuration and Sensitive Files:

    site:target.com ext:conf OR ext:config OR ext:cfg
    site:target.com filetype:env OR filetype:ini
    

    Locates configuration files that might contain sensitive data

  3. Legacy and Backup Files:

    site:target.com ext:bak OR ext:old OR ext:backup
    site:target.com inurl:backup OR inurl:old intext:password
    

    Discovers backup files that might contain sensitive information

🔍 Subdomain Enumeration

  1. Enter the target domain (e.g., example.com)
  2. Click "Find Subdomains"
  3. The tool will search for all accessible subdomains

⚠️ Ethical Guidelines

  1. Always obtain proper authorization before scanning any target
  2. Follow responsible disclosure practices
  3. Respect the target's security policies and terms of service
  4. Do not use this tool for malicious purposes
  5. Report findings through appropriate channels

🛡️ Legal Disclaimer

This tool is designed for security researchers and bug bounty hunters to assist in authorized security assessments. Users are responsible for ensuring they have proper authorization before scanning any target. The developers are not responsible for any misuse or damage caused by this tool.

🤝 Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

📝 License

This project is licensed under the MIT License. This means you can freely use, modify, distribute, and sell this software and its documentation. The only requirement is that you include the original copyright notice and license terms in any copy of the software/source. See the LICENSE file for the full license text.

👨‍💻 Author

Made with ❤️ by Tipu


Note: This tool is for educational and authorized testing purposes only. Always ensure you have proper authorization before testing any target.

About

A powerful web-based tool for advanced Google search queries and subdomain discovery, designed specifically for cybersecurity research and bug bounty hunting. Perfect for discovering hidden parameters, endpoints, and sensitive information during security assessments.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages