Skip to main content

A powerful command-line tool for Google dorking, enabling users to uncover hidden information and vulnerabilities with advanced search queries.

Project description

🔍 DumpDork

DumpDork is a powerful command-line tool for performing Google dorking, allowing users to uncover hidden information and vulnerabilities using advanced search queries directly from the terminal.

GitHub Release GitHub License PyPI - Version PyPI - Downloads

preview

Features

  • Effortless Querying: Construct complex search queries with ease using Google's powerful search operators.
  • Customizable Results: Specify the number of results to retrieve, with a maximum limit of 300.
  • Output Options: Save your findings in a neatly formatted JSON file for further analysis or reporting.
  • No CAPTCHA Required: This script does not require users to complete CAPTCHA, making it easier to retrieve results without interruptions.
  • Configurable Credentials: Manage your API credentials securely through a simple YAML configuration file.
  • Interactive Setup Wizard: With an user-friendly wizard which guides you through the setup process, helping you configure your API credentials settings step-by-step.

Installation

Manual:

  1. Clone the repository:
git clone https://github.com/mateofumis/dumpdork.git
cd dumpdork
  1. Set up a virtual environment (optional but recommended):
python3 -m venv env
source env/bin/activate  # On Windows use `.\env\Scripts\activate`
  1. Install dependencies:
pip3 install -r requirements.txt

Using pip/pipx install

  1. Install dumpdork with pip3
pip3 install dumpdork
# or as well with pipx
pipx install dumpdork

See this project in PyPi: https://pypi.org/project/dumpdork/

Configure your API credentials:

Create config.yaml file in ~/.config/dumpdork/config.yaml with the following structure:

rapidapi:
  host: google-search74.p.rapidapi.com
  key: "YOUR_RAPIDAPI_KEY"

How to get your credentials

  1. Visit https://rapidapi.com/auth/login/ and create an account or sign in.
  2. Once logged in, visit https://rapidapi.com/herosAPI/api/google-search74/playground and claim your FREE API credentials.
  3. Done! Now you can fill your config.yaml with your own credentials.

[*] See detailed instructions at: https://github.com/mateofumis/dumpdork/blob/main/API_SETUP_GUIDE.md

Usage

$: dumpdork
🔍 Welcome to DumpDork !!

Usage: dumpdork 'query' [--limit number] [--output filename.json] [--custom-config-file config.yaml]

Options:
  query                 The search query.
  --limit               Number of results to return (default is 50. Limit: 300).
  --output              Output file to save results in JSON format.
  --custom-config-file CUSTOM_CONFIG_FILE
			Path to custom YAML config file containing API credentials. Default is: ~/.config/dumpdork/config.yaml
  --wizard              Set up your API key for dumpdork, step by step with easy.

📋 Examples:
    $: dumpdork 'site:*.example.com AND (intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml) ' --limit 200 --output aws_credentials.json
    $: dumpdork '(site:*.example.com AND -site:docs.example.com) AND (inurl:"/login" | inurl:"/signup" | inurl:"/admin" | inurl:"/register") AND (ext:php | ext:aspx)' --limit 300 --output sqli_forms.json
    $: dumpdork 'site:*.example.com AND (intitle:"Index of /" | intitle:"index of") AND (intext:".log" | intext:".sql" | intext:".txt" | intext:".sh")' --custom-config-file ~/.config/dumpdork/config_files/credentials_01.yaml --output sensitive_files.json

Example Queries

  • Search for AWS Leaked Credentials:
$: dumpdork 'site:*.example.com AND (intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml) ' --limit 200 --output aws_credentials.json
  • Find SQL Injection Endpoints Forms:
$: dumpdork '(site:*.example.com AND -site:docs.example.com) AND (inurl:"/login" | inurl:"/signup" | inurl:"/admin" | inurl:"/register") AND (ext:php | ext:aspx)' --limit 300 --output sqli_forms.json
  • Search for Sensitive Files or Logs:
$: dumpdork 'site:*.example.com AND (intitle:"Index of /" | intitle:"index of") AND (intext:".log" | intext:".sql" | intext:".txt" | intext:".sh")' --custom-config-file ~/.config/dumpdork/config_files/credentials_01.yaml --output sensitive_files.json

License

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.

Contributing

Contributions are welcome! Please feel free to submit a pull request or open an issue.

Support me with a virtual Coffee! ❤️

If you find this tool useful, consider supporting me with a coffee!

Ko-Fi

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dumpdork-0.1.5.tar.gz (9.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dumpdork-0.1.5-py3-none-any.whl (10.0 kB view details)

Uploaded Python 3

File details

Details for the file dumpdork-0.1.5.tar.gz.

File metadata

  • Download URL: dumpdork-0.1.5.tar.gz
  • Upload date:
  • Size: 9.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.2

File hashes

Hashes for dumpdork-0.1.5.tar.gz
Algorithm Hash digest
SHA256 fa379e715ef66af11cea3f08c651e4b0c14edd97815214c3026903eedf8d759e
MD5 517e61b9deebc66e2ceb0bacc1a48914
BLAKE2b-256 8b33a02ab7d1754bb1581457ac6216dd3022409c942fff8a62884dacbd74ecdc

See more details on using hashes here.

File details

Details for the file dumpdork-0.1.5-py3-none-any.whl.

File metadata

  • Download URL: dumpdork-0.1.5-py3-none-any.whl
  • Upload date:
  • Size: 10.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.2

File hashes

Hashes for dumpdork-0.1.5-py3-none-any.whl
Algorithm Hash digest
SHA256 4df7042710f7ac138f4fa112786502612d945c4a2e927a98be3032e0b6b5a7f7
MD5 c3b2b137ab08c5d3bb21271498c13b24
BLAKE2b-256 6c01a9c8ee9f48758940ab56535defbc99eb083f1dd5b1a4d4bd6bd796fdca52

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page