google-dorks
The google-dorks tool enhances automated security workflows by leveraging advanced search techniques to discover sensitive data across various web platforms. It allows users to search for defined entities in documents using custom queries to identify potential vulnerabilities.
Ideal Use Cases & Fit
This tool is particularly effective in scenarios that require reconnaissance efforts to uncover unsecured information or sensitive data stored on public platforms. Typical inputs include newline-separated Google dork queries targeting specific websites. It performs best when integrated early in security assessments to identify potential attack vectors. However, it is not suitable for real-time monitoring or incident response tasks.
Value in Workflows
Integrating google-dorks into security workflows significantly aids in early reconnaissance activities. It identifies exposed sensitive information, helping security teams prioritize their efforts and mitigate risks. By automating these searches, organizations can enhance their overall security posture and reduce manual research workloads.
Input Data
The tool expects a file input containing newline-separated Google dork queries. Each query functions as a tailored search request targeting specific domains or content types. For example, an input file might contain:
site:example.com
intitle:example1
Configuration
- keyword: This parameter defines the keyword to search for, replacing
$KEYWORDin the dork queries. It is required for effective operation. - max-results: Controls the maximum number of results returned per dork query, with a default value of 100. This parameter is optional.
- proxy: Indicates the proxy to use for requests, facilitating privacy and security in data collection. This is a required parameter, and defaults to PROXY_FULL. Updated: 2026-02-10