Dorks Eye is a script I made in python 3. With this tool, you can easily find Google Dorks. Dork Eye collects potentially vulnerable web pages and applications on the Internet or other awesome info that is picked up by Google’s search bots. You can save the output in a file so that you can view it at a later time. You can determine the number of searches yourself. The number of websites to display
You can also use Dorks Eye as a command-line interface (CLI) to quickly search through Google. Dorks Eye shows only the links, without advertising, and is also really fast.
But be careful not to overdo it, otherwise, you have a chance that If you perform too many requests over a short period, Google will start to throw captchas at you. This is annoying and will limit how much or how fast you do the search.
I did build a little delay in the script so that the chances are smaller. – But still, be careful not to choose too large numbers.
What data can we find using Google Dorks?
- Username and passwords
- Admin login pages
- Sensitive documents
- Govt/military data
- Email lists
- Bank account details
- Vulnerable websites
- So much more …
What is Google Dorks
A Google Dork is a search that uses one or more of these advanced techniques to reveal something interesting. Something important to keep in mind, the web can be crawled by anyone. Google automatically indexes a website, and unless sensitive information is explicitly blocked from indexing (nofollow, robots.txt), all of the content can be searched via Dorks or advanced search operators.
I have previously written an article about Google Dorks, here you can find much more information about its use.
Install Dorks Eye
Here is the Link to the GitHub page Dorks Eye
A prerequisite for a script that I make must be that it is simple and easy to use and understand for everyone.
Dorks Eye has tested it so far on:
This list will be expanded
Dork Eye is written for Python 3. Clone the git repository and install the requirements.
sudo git clone https://github.com/BullsEye0/dorks-eye.git cd dorks-eye pip3 install -r requirements.txt
Dorks Eye Usage Linux
sudo python3 dorks-eye.py
That’s all ..!
Termux Install Dorks Eye
Dorks Eye can also be used in Termux ..!
git clone https://github.com/BullsEye0/dorks-eye.git cd dorks-eye pip install -r requirements.txt
Termux switched to python3. This is now standard. So you now only have to use the command “python“.
Here is a video I make:
Android Hacking with Termux | Dorks Eye Google Dork Script
Dork Eye Search Install
It may be that if you have just installed a new OS (Operating System) you may get some installation errors. First, check if python3 is installed on your computer. You can easily do this by typing python3 in your terminal.
If not, you can easily install it with the following command: (Debian-based)
sudo apt install python3
The next step is to install pip3, this is also very simple, and you can do it with the command below:
sudo apt install python3-pip
In the photo below you can see exactly how.
The last step is to install Google. Again this is also very simple, and you can do it with the command below:
pip3 install google
Google Dorks lists
I have stored on GitHub a complete list of up to 13.760 different Dorks. If you want to clone this Dork List to your machine you can do it using the below commands.
# Once cloned you can use `nano`, `vim`, `cat` or # Any other text editor to view and edit sudo git clone https://github.com/BullsEye0/google_dork_list.git cd google_dork_list cat google_Dorks.txt
Some Google Dorks examples with Dork Eye and Google Dorks List
It is wise not to save your login details in this way
Another small example
filetype:sql intext:password | pass | passwd intext:username intext:INSERT INTO `users` VALUES
However senseless, there is always an entrance.
Maybe not a good idea to keep your backups this way.
Google is blocking me
If you start getting HTTP 503 errors, Google has rightfully detected you as a bot and will block your IP for a set period of time. Just wait a while or: A good solution is to use proxychains.
(Or AnonSurf) Here in this article, I explain how to install: Install AnonSurf
Install Tor on Windows, (Kali) Linux and search The Dark Web is also a way.
Install Proxychains4 on Debian and derivated distributions
sudo apt install proxychains4 -y
Edit the /etc/proxychains4.conf configuration file to round robin the look ups through different proxy servers. In the example below, 2 dynamic socks proxies have been set up with different local listening ports (9050 and 9051).
vim /etc/proxychains4.conf Or nano /etc/proxychains4.conf
HACKERS LOVE THE TERMINAL
“You are a hacker. Your home is the terminal. You work on several projects at once, You know every keystroke is valuable. With just some commands, you can automate tasks, install your favorite software, view a whole network, find vulnerabilities on just about anything connected to the internet, compile a script, create additional user accounts, properly configure anonymity software, and optimize our interactions with terminals. When you search for something, it should be blazing fast. If something is less than 100% efficient, you will spend hours figuring out the right way to save yourself seconds.”
As I mentioned above, for me personally an outcome of just the left is the best. So I can see in a glance if there is a vulnerability somewhere, just by seeing the whole link.
There is also a great advantage that there is no advertising. And that it is reasonably fast ..
IMPORTANT THINGS TO REMEMBER
- This article was written for educational purposes and pentest only.
- The author can not be held responsible for damages caused by the use of these resources.
- You will not misuse the information to gain unauthorized access.
- The information shall only be used to expand knowledge and not for causing malicious or damaging attacks.
- Just remember, Performing any hacks without written permission is illegal ..!
Read also the Disclaimer
All the techniques provided in the tutorials on the hackingpassion.com, YouTube channel, and on the website hackingpassion.com are meant for educational purposes only.
If you are using any of those techniques for illegal purposes, hackingpassion.com can’t be held responsible for possible lawful consequences.
My goal is to educate people and increase awareness by exposing methods used by real black-hat hackers and show how to secure systems from these hackers.
If you have any questions about this article, any feedback, suggestions if you want to share your thoughts, please feel free to do it using the below comment form.