All Projects → Zarcolio → Sitedorks

Zarcolio / Sitedorks

Licence: gpl-3.0
Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term with a default set of websites, bug bounty programs or a custom collection.

Programming Languages

python
139335 projects - #7 most used programming language
python3
1442 projects

Projects that are alternatives of or similar to Sitedorks

Translators
🌏🌍🌎Translators🌎🌍🌏 is a library which aims to bring free, multiple, enjoyable translation to individuals and students in Python. Translators是一个旨在用Python为个人和学生带来免费、多样、愉快翻译的库。
Stars: ✭ 295 (+33.48%)
Mutual labels:  bing, google, baidu, yandex
Favfreak
Making Favicon.ico based Recon Great again !
Stars: ✭ 564 (+155.2%)
Mutual labels:  osint, hacking, recon, bugbounty
Search Deflector
A small program that forwards searches from Cortana to your preferred browser and search engine.
Stars: ✭ 620 (+180.54%)
Mutual labels:  bing, google, duckduckgo, search
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+93.21%)
Mutual labels:  osint, hacking, recon, bugbounty
Jsearch
jSearch(聚搜) 是一款专注内容的chrome搜索扩展,一次搜索聚合多平台内容。
Stars: ✭ 193 (-12.67%)
Mutual labels:  bing, google, baidu, search
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-23.53%)
Mutual labels:  osint, hacking, recon, bugbounty
Urlhunter
a recon tool that allows searching on URLs that are exposed via shortener services
Stars: ✭ 934 (+322.62%)
Mutual labels:  osint, recon, bugbounty
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+340.72%)
Mutual labels:  hacking, recon, bugbounty
Getjs
A tool to fastly get all javascript sources/files
Stars: ✭ 190 (-14.03%)
Mutual labels:  hacking, recon, bugbounty
Image Downloader
Download images from Google, Bing, Baidu. 谷歌、百度、必应图片下载.
Stars: ✭ 1,173 (+430.77%)
Mutual labels:  bing, google, baidu
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+3963.8%)
Mutual labels:  osint, hacking, bugbounty
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-14.03%)
Mutual labels:  hacking, recon, bugbounty
Sou
简单搜索,一个简单的前端界面。用惯了各种导航首页,满屏幕尽是各种不厌其烦的广告和资讯;尝试自己写个自己的主页。
Stars: ✭ 628 (+184.16%)
Mutual labels:  google, baidu, search
Reconspider
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (+181%)
Mutual labels:  osint, hacking, recon
Search Engine Parser
Lightweight package to query popular search engines and scrape for result titles, links and descriptions
Stars: ✭ 216 (-2.26%)
Mutual labels:  bing, google, search
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-52.49%)
Mutual labels:  osint, hacking, recon
D4n155
OWASP D4N155 - Intelligent and dynamic wordlist using OSINT
Stars: ✭ 105 (-52.49%)
Mutual labels:  google, duckduckgo, osint
Iky
OSINT Project
Stars: ✭ 203 (-8.14%)
Mutual labels:  osint, hacking, recon
Crow Translate
A simple and lightweight translator that allows to translate and speak text using Google, Yandex and Bing.
Stars: ✭ 503 (+127.6%)
Mutual labels:  bing, google, yandex
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+144.8%)
Mutual labels:  osint, recon, bugbounty

About sitedorks

Search Google, Bing, Ecosia, Yahoo or Yandex for a search term with several websites. A default list is already provided, which contains Github, Gitlab, Surveymonkey, Trello etc etc. Currently, a default list of 386 dorkable websites is available. By default, the following categories are on file:

  • analysis(12)
  • cloud(48)
  • comm(39)
  • dev(62)
  • docs(48)
  • edu(6)
  • fin(7)
  • forms(12)
  • orgs(29)
  • other(6)
  • remote(1)
  • shortener(31)
  • social(76)
  • storage(9)

Why use sitedorks?

Why wouldn't you just enter dorks for several websites manually? Because:

  • It's really easy to query different search engines.
  • Dorks can be executed per 1 or more categories.
  • It's easy to create different input files for different uses.
  • Adding new websites to your search query can be arranged by just adding them to an input file.
  • It already has a lot of dorkable websites included.
  • The list with dorkable websites is updated regularly.
  • Some search engines ignore too many keywords/characters in a query and with argument -count it's easy to split your dork into more queries.
  • It contains a list of several bug bounty platforms. With 1 command you can search domains of programs on several bug bounty platforms. Find the "easter egg" in this feature :)
  • It contains a list of Dutch government agencies and educational services. With 1 command you can search domains either of the Dutch government or educational services.
    • Need help here for other lists that can be useful, for example domains of government and educational services in other countries.
  • Because you want to help plant more trees using the search engine Ecosia (Bing based)

Install

Sitedorks should be able to run with a default Kali Linux installation using Python 3 without installing additional Python packages. Just run:

git clone https://github.com/Zarcolio/sitedorks
cd sitedorks
bash install.sh

If you're running into trouble running sitedorks, please drop me an issue and I'll try to fix it :)

Usage

usage: sitedorks [-h] [-cat <category>] [-cats] [-count <count>] [-engine <engine>] [-file <file>]
[-query <query>] [-site <on|off|inurl>] [-excl <domains>] [-echo]

Use your favorite search engine to search for a search term with different websites. Use single quotes around a
query with double quotes. Be sure to enclose a query with single quotes it contains shell control characters like
space, ';', '>', '|', etc.

optional arguments:
  -h, --help            Show this help message, print categories on file (add -file to check other CSV file) and exit.
  -cat <category>       Choose from 1 or more categories, use ',' (comma) as delimiter. Defaults to all categories.
  -cats                 Show all categories on file, use with or without -file.
  -count <count>        How many websites are searched per query. Google has a maximum length for queries.
  -engine <engine>      Search with 'google', 'baidu', 'bing', 'bing-ecosia', 'duckduckgo' 'yahoo' or 'yandex', defaults to 
                        'google'.
  -file <file>          Enter a custom website list.
  -query <query>        Enter a mandatory search term.
  -site <on|off|inurl>  Turn the 'site:' operator 'on' or 'off', or replace it with 'inurl:' (only for Google), defaults to 
                        'on'.
  -excl <domains>       Excluded these domains from the search query.
  -echo                 Prints the search query URLs, for further use like piping or bookmarking.
  -ubb                  Updates bug bounty files (in en out scope) and exits. Uses bbrecon.
  -wait <seconds>       Wait x seconds, defaults to 5 seconds.

Examples

Small warning here: if you don't use -cat sitedorks will open a lot of tabs in your browser and probably will make Google throw you a CAPTCHA. Increase waiting time with option '-wait' to decrease the chance of getting a CAPTCHA.

Want to look for "uber.com" with different sites containing all kinds of content using Google? Use the following command:

sitedorks -query '"uber.com"'

Want to look for "uber website" (with quotes and spaces in the query)? Use the following command:

sitedorks -query '"uber website"'

Want to search for communication invites with Yandex but leave site: out of the query? Just use the following command:

sitedorks -cat comm -site disable -engine yandex -query uber

And if you want to see which categories are on file, for example with the hackerone platform:

sitedorks -file sitedorks-bbrecon.csv -cats

If you want to download/update the bug bounty files, you can use the -ubb parameter (it uses bbrecon):

sitedorks -ubb

The -ubb argument creates two files: sitedorks-bbrecon-inscope.csv and sitedorks-bbrecon-outscope.csv. Use the following command for finding exploitable systems or juicy info (always check if a system is in scope, although these these domains are in scope, it doesn't always mean that this subdomain or system is):

sitedorks -file sitedorks-bbrecon-inscope.csv -cat somevdp -query "exploitable systems/juicy info"

Use this command for finding juicy info only, because these domains are out of scope:

sitedorks -file sitedorks-bbrecon-outscope.csv -cat somevdp -query "juicy info"

Google Dorks

Don't know what to look for? Try:

Contribute?

Do you have some usefull additions to the script or to the list of dorkable websites, please send in a pull request to help make this script better or contact me @ Twitter :)

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].