Skip to content

Commit 2f11bcd

Browse files
committed
new release: v1.0.0
1 parent 29dcb2b commit 2f11bcd

File tree

1 file changed

+44
-34
lines changed

1 file changed

+44
-34
lines changed

README.md

Lines changed: 44 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,7 @@ DumpDork is a powerful command-line tool for performing Google dorking, allowing
1111

1212
## Features
1313

14-
- **Effortless Querying**: Construct complex search queries with ease using Google's powerful search operators.
15-
- **Customizable Results**: Specify the number of results to retrieve, with a maximum limit of 300.
16-
- **Output Options**: Save your findings in a neatly formatted JSON file for further analysis or reporting.
14+
- **Multi-Engine Support**: Perform searches across **Google**, **Brave**, and **GitHub** from a single interface.
1715
- **No CAPTCHA Required**: This script does not require users to complete CAPTCHA, making it easier to retrieve results without interruptions.
1816
- **Configurable Credentials**: Manage your API credentials securely through a simple YAML configuration file.
1917
- **Interactive Setup Wizard**: With an user-friendly wizard which guides you through the setup process, helping you configure your API credentials settings step-by-step.
@@ -47,70 +45,82 @@ pip3 install -r requirements.txt
4745
1. Install dumpdork with pip3
4846

4947
```bash
50-
pip3 install dumpdork
48+
$: pip3 install dumpdork
5149
# or as well with pipx
52-
pipx install dumpdork
50+
$: pipx install dumpdork
5351
```
5452

5553
See this project in PyPi: [https://pypi.org/project/dumpdork/](https://pypi.org/project/dumpdork/)
5654

57-
## Configure your API credentials:
55+
## Configuration
5856

59-
Create config.yaml file in `~/.config/dumpdork/config.yaml` with the following structure:
57+
DumpDork stores its configuration in ``~/.config/dumpdork/config.yaml`.
58+
59+
### The Easy Way (Wizard)
60+
61+
Simply run the tool with the wizard flag to set up your keys interactively:
62+
63+
```bash
64+
$: python3 dumpdork.py -w
65+
```
66+
67+
### Manual Configuration
68+
69+
Create the file with the following structure:
6070

6171
```yaml
6272
rapidapi:
6373
host: google-search74.p.rapidapi.com
64-
key: "YOUR_RAPIDAPI_KEY"
74+
keys:
75+
google: "YOUR_RAPIDAPI_KEY"
76+
brave: "YOUR_RAPIDAPI_KEY"
77+
github: "YOUR_GITHUB_TOKEN"
6578
```
6679
67-
### How to get your credentials
68-
69-
1. Visit [https://rapidapi.com/auth/login/](https://rapidapi.com/auth/login/) and create an account or sign in.
70-
2. Once logged in, visit [https://rapidapi.com/herosAPI/api/google-search74/playground](https://rapidapi.com/herosAPI/api/google-search74/playground) and claim your FREE API credentials.
71-
3. Done! Now you can fill your `config.yaml` with your own credentials.
72-
7380
**[*] See detailed instructions at: https://github.com/mateofumis/dumpdork/blob/main/API_SETUP_GUIDE.md**
7481
7582
## Usage
7683
7784
```
7885
$: dumpdork
79-
🔍 Welcome to DumpDork !!
80-
81-
Usage: dumpdork 'query' [--limit number] [--output filename.json] [--config-file config.yaml]
82-
83-
Options:
84-
query The search query.
85-
--limit Number of results to return (default is 50. Limit: 300).
86-
--output Output file to save results in JSON format.
87-
--config-file Path to custom YAML config file containing API credentials. Default is: ~/.config/dumpdork/config.yaml
88-
--wizard Set up your API key for dumpdork, step by step with easy.
89-
90-
📋 Examples:
91-
$: dumpdork 'site:*.example.com AND (intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml) ' --limit 200 --output aws_credentials.json
92-
$: dumpdork '(site:*.example.com AND -site:docs.example.com) AND (inurl:"/login" | inurl:"/signup" | inurl:"/admin" | inurl:"/register") AND (ext:php | ext:aspx)' --limit 300 --output sqli_forms.json
93-
$: dumpdork 'site:*.example.com AND (intitle:"Index of /" | intitle:"index of") AND (intext:".log" | intext:".sql" | intext:".txt" | intext:".sh")' --config-file ~/.config/dumpdork/config_files/credentials_01.yaml --output sensitive_files.json
86+
____ ____ _
87+
| _ \ _ _ _ __ ___ _ __ | _ \ ___ _ __| | __
88+
| | | | | | | '_ ` _ \| '_ \| | | |/ _ \| '__| |/ /
89+
| |_| | |_| | | | | | | |_) | |_| | (_) | | | <
90+
|____/ \__,_|_| |_| |_| .__/|____/ \___/|_| |_|\_\
91+
|_|
92+
Advanced Dorking Tool v1.0
93+
Created by: Mateo Fumis (hackermater)
94+
95+
usage: dumpdork.py [-h] [-s {google,github,brave}] [-l LIMIT] [-o OUTPUT] [-w] [query]
96+
97+
Use -h or --help for full details.
9498
```
9599

96100
Example Queries
97101

98-
- Search for AWS Leaked Credentials:
102+
- Search for AWS Leaked Credentials (Google):
99103

100104
```bash
101105
$: dumpdork 'site:*.example.com AND (intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml) ' --limit 200 --output aws_credentials.json
102106
```
103107

104-
- Find SQL Injection Endpoints Forms:
108+
- Find Sensitive Repositories (GitHub):
109+
110+
```bash
111+
$: dumpdork -s github "filename:config.php 'DB_PASSWORD'"
112+
```
113+
114+
- Search via Brave Search:
105115

106116
```bash
107-
$: dumpdork '(site:*.example.com AND -site:docs.example.com) AND (inurl:"/login" | inurl:"/signup" | inurl:"/admin" | inurl:"/register") AND (ext:php | ext:aspx)' --limit 300 --output sqli_forms.json
117+
$: dumpdork -s brave "inurl:admin login"
108118
```
109119

110-
- Search for Sensitive Files or Logs:
120+
- Save Results to JSON:
111121

112122
```bash
113-
$: dumpdork 'site:*.example.com AND (intitle:"Index of /" | intitle:"index of") AND (intext:".log" | intext:".sql" | intext:".txt" | intext:".sh")' --config-file ~/.config/dumpdork/config_files/credentials_01.yaml --output sensitive_files.json
123+
$: dumpdork "sensitive data" -o results.json
114124
```
115125

116126
- Take a look at **GHDB** for more Dorks: [https://www.exploit-db.com/google-hacking-database](https://www.exploit-db.com/google-hacking-database)

0 commit comments

Comments
 (0)