Skip to content
Related Articles

Related Articles

Improve Article
Save Article
Like Article

DorkScout – Automate google dork scan against the entiere internet or specific targets

  • Last Updated : 23 Sep, 2021

Dorking is the technique used for advanced searching. Dorking can be useful in target domain detection or forgetting some sensitive data from the target domain, This can be done through automated tools which can reduce the time of manual searching. DorkScout is a tool to automate the finding of vulnerable applications or hidden files around the internet through google searches, dorkscout first starts by retrieving the dork’s lists from https://www.exploit-db.com/google-hacking-database, and then it scans a given target or everything it endows. DorkScout tool is developed in Golang language and is available on the GitHub platform. DorkScout tool is open-source and free-to-use.

Note: DorkScout is a Golang language-based tool, so you need to have a Golang environment on your system. So check this link to Install  Golang in your system. – Installation of Go Lang in Linux

Installation of DorkScout Tool on Kali Linux OS

Step 1: If you have downloaded Golang in your system, verify the installation by checking the version of Golang, use the following command.

go version

Step 2: Get the DorkScout repository or clone the DorkScout tool from Github, use the following command.

sudo GO111MODULE=on go get -u github.com/R4yGM/dorkscout

Step 3: Change the directory to access the tool. Use the following command

cd go/bin

Step 4: Check the help menu page to get a better understanding of the DorkScout tool, use the following command.

dorkscout -h

Working with DorkScout Tool on Kali Linux OS

Example 1:  Scans a specific website for a list of dorks

dorkscout scan -d= “/home/kali/Desktop/dorkscout/dorks/Sensitive\ Directories.dorkscout” -H= “/home/kali/Desktop/dorkscout/results/”

We are displaying the list of dorks in the below screenshot.

We have got the results for our Dorking scan.

.html formatted results and displayed in the below screenshot.

Example 2: Install a list of dorks from exploit-db.com/ Install word-lists

dorkscout install -o /home/kali/Desktop/

In this example, we will be installing new and updated dorking lists for the exploit-db database.

Dorks are installed in the Desktop directory.

In the above screenshot, we can see that all the dork files are installed on the desktop directory. In the below screenshot, we have opened the “Network or Vulnerability Data.dorkscout” file which contains the dork query related to Network.

My Personal Notes arrow_drop_up
Recommended Articles
Page :

Start Your Coding Journey Now!