Dorks Eye Google Hacking Dork Scraping and Searching Script

Dorks Eye Google

Dorks Eye is a script I made in python 3. With this tool, you can easily find Google Dorks. Dork Eye collects potentially vulnerable web pages and applications on the Internet or other awesome info that is picked up by Google’s search bots. You can save the output in a file so that you can view it at a later time. You can determine the number of searches yourself. The number of websites to display

You can also use Dorks Eye as a command-line interface (CLI) to quickly search through Google. Dorks Eye shows only the links, without advertising, and is also really fast.

But be careful not to overdo it, otherwise, you have a chance that If you perform too many requests over a short period, Google will start to throw captchas at you. This is annoying and will limit how much or how fast you do the search.

I did build a little delay in the script so that the chances are smaller. – But still, be careful not to choose too large numbers.


What data can we find using Google Dorks?

  • Username and passwords
  • Admin login pages
  • Sensitive documents
  • Govt/military data
  • Email lists
  • Bank account details
  • Vulnerable websites
  • So much more …

What is Google Dorks

A Google Dork is a search that uses one or more of these advanced techniques to reveal something interesting. Something important to keep in mind, the web can be crawled by anyone. Google automatically indexes a website, and unless sensitive information is explicitly blocked from indexing (nofollow, robots.txt), all of the content can be searched via Dorks or advanced search operators.


I have previously written an article about Google Dorks, here you can find much more information about its use.



Install Dorks Eye

Here is the Link to the GitHub page Dorks Eye

Linux

A prerequisite for a script that I make must be that it is simple and easy to use and understand for everyone.

Dorks Eye has tested it so far on:
Kali Linux
Parrot Security
BlackArch
Termux

This list will be expanded


Dork Eye is written for Python 3. Clone the git repository and install the requirements.

sudo git clone https://github.com/BullsEye0/dorks-eye.git
cd dorks-eye
pip3 install -r requirements.txt

Dorks Eye Usage Linux

sudo python3 dorks-eye.py

That’s all ..!


Termux Install Dorks Eye

Dorks Eye can also be used in Termux ..!

git clone https://github.com/BullsEye0/dorks-eye.git
cd dorks-eye
pip install -r requirements.txt

Usage Termux

Termux switched to python3. This is now standard. So you now only have to use the command “python“.

python dorks-eye.py

Here is a video I make:
Android Hacking with Termux | Dorks Eye Google Dork Script


Termux Dorks Eye Google

Dork Eye Search Install


Become a member on LBRY
Plus earning LBRY for watching videos ♥️
Here an invitation link, so that we both benefit.
In this way, you also support my work.

https://lbry.tv/$/invite/@hackingpassion:9

Obviously you can also follow me on YouTube (But not all videos will be placed there).


NameError name search is not defined

It may be that if you have just installed a new OS (Operating System) you may get some installation errors. First, check if python3 is installed on your computer. You can easily do this by typing python3 in your terminal.


python3

If not, you can easily install it with the following command: (Debian-based)

sudo apt install python3

The next step is to install pip3, this is also very simple, and you can do it with the command below:

sudo apt install python3-pip

In the photo below you can see exactly how.


install python and pip

The last step is to install Google. Again this is also very simple, and you can do it with the command below:

pip3 install google


dorks eye

Google Dorks lists

I have stored on GitHub a complete list of up to 13.760 different Dorks. If you want to clone this Dork List to your machine you can do it using the below commands.

# Once cloned you can use `nano`, `vim`, `cat` or
# Any other text editor to view and edit
sudo git clone https://github.com/BullsEye0/google_dork_list.git
cd google_dork_list
cat google_Dorks.txt

google_dork_list

Google Dorks List

Some Google Dorks examples with Dork Eye and Google Dorks List

filetype:log inurl:"password.log"

filetype:log inurl:"password.log" dorks

It is wise not to save your login details in this way


google dorks

Another small example

filetype:sql intext:password | pass | passwd intext:username intext:INSERT INTO `users` VALUES

Dorks Eye Google

vb

However senseless, there is always an entrance.

indexof:backup/web.config

indexof:backup/web.config

Maybe not a good idea to keep your backups this way.


ba1

Google is blocking me

If you start getting HTTP 503 errors, Google has rightfully detected you as a bot and will block your IP for a set period of time. Just wait a while or: A good solution is to use proxychains.
(Or AnonSurf) Here in this article, I explain how to install: Install AnonSurf

Install Tor on Windows, (Kali) Linux and search The Dark Web is also a way.


Install Proxychains4 on Debian and derivated distributions

sudo apt install proxychains4 -y

sudo apt install proxychains4

Edit the /etc/proxychains4.conf configuration file to round robin the look ups through different proxy servers. In the example below, 2 dynamic socks proxies have been set up with different local listening ports (9050 and 9051).

vim /etc/proxychains4.conf

Or

nano /etc/proxychains4.conf

Edit the /etc/proxychains4.conf configuration file to round robin the look ups through different proxy servers. In the example below, 2 dynamic socks proxies have been set up with different local listening ports (9050 and 9051).  vim /etc/proxychains4.conf Or nano /etc/proxychains4.conf

Video

Link: Dorks Eye Google Hacking Dork Scraping and Searching Script



Become a member on LBRY
Plus earning LBRY for watching videos ♥️
Here an invitation link, so that we both benefit.
In this way, you also support my work.

https://lbry.tv/$/invite/@hackingpassion:9

Obviously you can also follow me on YouTube (But not all videos will be placed there).


HACKERS LOVE THE TERMINAL


“You are a hacker. Your home is the terminal. You work on several projects at once, You know every keystroke is valuable. With just some commands, you can automate tasks, install your favorite software, view a whole network, find vulnerabilities on just about anything connected to the internet, compile a script, create additional user accounts, properly configure anonymity software, and optimize our interactions with terminals. When you search for something, it should be blazing fast. If something is less than 100% efficient, you will spend hours figuring out the right way to save yourself seconds.”


Conclusion

As I mentioned above, for me personally an outcome of just the left is the best. So I can see in a glance if there is a vulnerability somewhere, just by seeing the whole link.
There is also a great advantage that there is no advertising. And that it is reasonably fast ..


IMPORTANT THINGS TO REMEMBER

  • This article was written for educational purposes and pentest only.
  • The author can not be held responsible for damages caused by the use of these resources.
  • You will not misuse the information to gain unauthorized access.
  • The information shall only be used to expand knowledge and not for causing malicious or damaging attacks.
  • Just remember, Performing any hacks without written permission is illegal ..!

Read also the Disclaimer

All the techniques provided in the tutorials on the hackingpassion.com, YouTube channel, and on the website hackingpassion.com are meant for educational purposes only.

If you are using any of those techniques for illegal purposes, hackingpassion.com can’t be held responsible for possible lawful consequences.

My goal is to educate people and increase awareness by exposing methods used by real black-hat hackers and show how to secure systems from these hackers.


Finally

If you have any questions about this article, any feedback, suggestions if you want to share your thoughts, please feel free to do it using the below comment form.


Bulls Eye
My name is Jolanda de Koff and on the internet, I'm also known as Bulls Eye. Ethical Hacker, Penetration tester, Researcher, Programmer, Self Learner, and forever n00b. Not necessarily in that order. Like to make my own hacking tools and I sometimes share them with you. "You can create art & beauty with a computer and Hacking is not a hobby but a way of life ..." I ♥ open-source and Linux"
error: Content is protected !!