Showing 9 open source projects for "google dorks"

View related business solutions
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    pagodo

    pagodo

    Automate Google Hacking Database scraping and searching

    pagodo automates Google searching for potentially vulnerable web pages and applications on the Internet. It replaces manually performing Google dork searches with a web GUI browser. There are 2 parts. The first is ghdb_scraper.py that retrieves the latest Google dorks and the second portion is pagodo.py that leverages the information gathered by ghdb_scraper.py.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    GooFuzz

    GooFuzz

    OSINT fuzzing tool using Google dorks to find exposed resources

    GooFuzz is an open source security tool designed to perform fuzzing using an OSINT-based approach by leveraging advanced Google search techniques. It is written in Bash and automates the use of Google Dorking queries to discover publicly accessible information related to a target domain. Instead of directly sending requests to the target server, GooFuzz gathers results through search engine indexing, allowing enumeration without leaving traces in the target’s server logs. This method enables...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    go-dork

    go-dork

    Fast Go-based CLI scanner for running automated search engine dorks

    go-dork is an open source command-line tool designed to automate search engine dorking and reconnaissance tasks. Written in the Go programming language, it focuses on speed and efficiency when executing advanced search queries across multiple search engines. It allows users to run specialized queries, often referred to as “dorks,” to discover publicly exposed data, misconfigurations, or potentially vulnerable resources. It supports several major search engines and enables users to switch...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    Mr.Holmes

    Mr.Holmes

    A Complete Osint Tool

    Mr.Holmes is a project focused on information gathering by public sources about social networks,phone-numbers, domains and ip and with the help of Google-Dorks it generated some useful links for information gathering. It can geolocate any ip or domain and geolocate approximately every location of almost all the companies. Including Who-is Lookup, Phone-Carriers and Proxied Requests.
    Downloads: 43 This Week
    Last Update:
    See Project
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 5
    BigBountyRecon

    BigBountyRecon

    Automates reconnaissance for bug bounty and penetration testing target

    BigBountyRecon is an open source reconnaissance tool designed to assist security researchers, penetration testers, and bug bounty hunters during the early stages of security assessments. It automates the collection of publicly accessible information about a target organization by combining numerous reconnaissance techniques with widely used Google dorks and other open source resources. Its main goal is to accelerate the information-gathering phase, which is often considered one of the most important steps in penetration testing and bug hunting. By quickly identifying potential information leaks and publicly exposed resources, the tool helps users gain an initial understanding of the target’s security posture. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 6
    GHDB 3953 html
    Google Hacking-Database 1-3953, html format. Google Dorks
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    SQLI Hunter v1.2

    An automation tool to scan for an Sql Injection vulnerability.

    SQLI Hunter is an automation tool to scan for an Sql Injection vulnerability in a website. It automates the search of sqli vulnerable links from Google using google dorks! SQLI Hunter can also find admin page of any website by using some predefined admin page lists. Fast and Easy to use ! ================ Coded By MAK ================
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8

    Dork Searcher

    Search Google Dorks for SQLi Vulnerabilities

    Dork Searcher is a small utility that enables you to easily use Google to search for SQLi vulnerable web servers. Saves the results in a text or XML file. Uses the Tor VPN/Proxy client or your own Socks 4a or 5 proxy server for anonymity. Over 350 Google Dorks included. Easily add your own to the list by simply editing a text file. THE AUTHOR OF THIS SOFTWARE IN NO WAY CONDONES THE USE OF IT FOR ANY ILLEGAL ACTIVITIES.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 9

    SkunxTools

    WebApp Pentest Tool

    This is an Alpha version of what is to become an all in one tool for pentesting of web applications. In its current phase it currently scans google dorks and tests for sql vulnerabilities. Once urls are harvested from google dorks they are saved to a log file for future reference. One a sql check is run, the vulnerable URLs are saved to a seperate log file. View the readme in /docs for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB