GooFuzz is an open source security tool designed to perform fuzzing using an OSINT-based approach by leveraging advanced Google search techniques. It is written in Bash and automates the use of Google Dorking queries to discover publicly accessible information related to a target domain. Instead of directly sending requests to the target server, GooFuzz gathers results through search engine indexing, allowing enumeration without leaving traces in the target’s server logs. This method enables the discovery of potentially sensitive files, directories, subdomains, and parameters that are already exposed on the web. By combining wordlists, search operators, and file extension filters, the tool helps security professionals locate misconfigured or unintentionally exposed resources. GooFuzz is commonly used in penetration testing, reconnaissance, and bug bounty research where passive information gathering is important.
Features
- Uses Google Dorking techniques to automate advanced search queries
- Enumerates directories, files, subdomains, and parameters from indexed results
- Performs passive reconnaissance without sending requests directly to the target server
- Supports wordlists and file extension filters to refine searches
- Allows exporting discovered results to an output file for analysis
- Includes options for proxies, delays, and exclusions to control search behavior