MSDorkDump is a Google Dork File Finder that queries a specified domain name and variety of file extensions

Overview

msdorkdump

ko-fi

MSDorkDump is a Google Dork File Finder that queries a specified domain name and variety of file extensions (pdf, doc, docx, etc), and downloads them. Note that due to Google's built in rate limiting, queries may end up timed out if too many are made in a short amount of time.

The goal is to implement some custom tooling into a "MayorSec Toolkit" to be released sometime in the future.

Usage

Installing MSDorkDump

git clone https://github.com/dievus/msdorkdump.git

Change directories to msdorkdump and run:

pip3 install -r requirements.txt

This will run the install script to add necessary dependencies to your system.

python3 msdorkdump.py

And that's it!

You might also like...
SubFind - Subdomain Finder Tools
SubFind - Subdomain Finder Tools

SubFind (Subdomain Finder Tools) Info Tools Result Of Subdomain Command In Termi

AttractionFinder - 2022 State Qualified FBLA Attraction Finder Application

Attraction Finder Developers: Riyon Praveen, Aaron Bijoy, & Yash Vora How It Wor

Yesitsme - Simple OSINT script to find Instagram profiles by name and e-mail/phone
Yesitsme - Simple OSINT script to find Instagram profiles by name and e-mail/phone

Simple OSINT script to find Instagram profiles by name and e-mail/phone

"Video Moment Retrieval from Text Queries via Single Frame Annotation" in SIGIR 2022.

ViGA: Video moment retrieval via Glance Annotation This is the official repository of the paper "Video Moment Retrieval from Text Queries via Single F

A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or LFI.
A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or LFI.

BurpParamFlagger A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF

Uncover the full name of a target on Linkedin.
Uncover the full name of a target on Linkedin.

Revealin Uncover the full name of a target on Linkedin. It's just a little PoC exploiting a design flaw. Useful for OSINT. Screenshot Usage $ git clon

Pass2Pwn: a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on the organization's name
Pass2Pwn: a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on the organization's name

Pass2Pwn is a simple python3 tool created to assist penetration testers generate possible passwords for a targeted system based solely on the organization's name

This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit
This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit

CVE-2021-40444 builders This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit. This repo is just for testing, re

Get important strings inside [Info.plist] & and Binary file also all output of result it will be saved in [app_binary].json , [app_plist_file].json file
Get important strings inside [Info.plist] & and Binary file also all output of result it will be saved in [app_binary].json , [app_plist_file].json file

Get important strings inside [Info.plist] & and Binary file also all output of result it will be saved in [app_binary].json , [app_plist_file].json file

Comments
  • Errorcode 429

    Errorcode 429

    [Error Code 429] Google is timing out queries. Wait a while and try again.

    got this after about 4 searches

    maybe for the future an good idea to add some additional search engines :)

    wontfix 
    opened by bashinho 1
  • UTF-Decode error

    UTF-Decode error

    Hi, i did this search

    python3 msdorkdump.py -t github.com -n 1 -d

    And this is the result:

    [doc extension found] - https://github.com/qreal/qreal/wiki/simonova.doc

    Metadata results for simonova.doc

    Traceback (most recent call last): File "msdorkdump.py", line 239, in msdorker() File "msdorkdump.py", line 204, in msdorker response = getoutput(cmd) File "/usr/lib/python3.8/subprocess.py", line 635, in getoutput return getstatusoutput(cmd)[1] File "/usr/lib/python3.8/subprocess.py", line 616, in getstatusoutput data = check_output(cmd, shell=True, text=True, stderr=STDOUT) File "/usr/lib/python3.8/subprocess.py", line 415, in check_output return run(*popenargs, stdout=PIPE, timeout=timeout, check=True, File "/usr/lib/python3.8/subprocess.py", line 495, in run stdout, stderr = process.communicate(input, timeout=timeout) File "/usr/lib/python3.8/subprocess.py", line 1015, in communicate stdout = self.stdout.read() File "/usr/lib/python3.8/codecs.py", line 322, in decode (result, consumed) = self._buffer_decode(data, self.errors, final) UnicodeDecodeError: 'utf-8' codec can't decode byte 0xc4 in position 326: invalid continuation byte

    bug 
    opened by bashinho 1
  • Invalid Argument error

    Invalid Argument error

    I got this error which stopped the program.

    Traceback (most recent call last): File "C:\Users\catarina\msdorkdump\msdorkdump.py", line 89, in msdorker() File "C:\Users\catarina\msdorkdump\msdorkdump.py", line 61, in msdorker urllib.request.urlretrieve(url_path, f'{tail}') File "C:\Python310\lib\urllib\request.py", line 251, in urlretrieve tfp = open(filename, 'wb') OSError: [Errno 22] Invalid argument: 'index.php?option=com_docman&task=doc_download&gid=1541&lang=pt'

    I ran it with this command python msdorkdump.py ualg.pt

    Could you check? Thanks.

    opened by cboto314 1
Owner
Joe Helle
Also known as the Mayor
Joe Helle
Tinyman exploit finder - Tinyman exploit finder for python

tinyman_exploit_finder There was a big tinyman exploit. You can read about it he

fish.exe 9 Dec 27, 2022
Magicspoofing - A python3 script for search possible misconfiguration in a DNS related to security protections of email service from the domain name

A python3 script for search possible misconfiguration in a DNS related to security protections of email service from the domain name. This project is for educational use, we are not responsible for its misuse.

null 20 Dec 2, 2022
Python DNS Lookup: The Domain Name System (DNS) is basically the phonebook of the Internet

-Python-DNS-Lookup- ✨ ?? Python DNS Lookup ✨ ?? The Domain Name System (DNS) is

Ronnie Atuhaire 2 Feb 14, 2022
Send CVE information to the specified mailbox (from Github)

Send CVE information to the specified mailbox (from Github)

null 91 Nov 8, 2022
An OSINT tool that searches for devices directly connected to the internet (IoT) with a user specified query. It returns results for Webcams, Traffic lights, Refridgerators, Smart TVs etc.

An OSINT tool that searches for devices directly connected to the internet (IoT) with a user specified query. It returns results for Webcams, Traffic

Richard Mwewa 48 Nov 20, 2022
DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.

DLLirant DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary. Live Demo How to install You need to install Visual Stud

null 314 Dec 30, 2022
Consolidating and extending hosts files from several well-curated sources. You can optionally pick extensions to block pornography, social media, and other categories.

Take Note! With the exception of issues and PRs regarding changes to hosts/data/StevenBlack/hosts, all other issues regarding the content of the produ

Steven Black 22.1k Jan 2, 2023
Burp Extensions

Burp Extensions This is a collection of extensions to Burp Suite that I have written. getAllParams.py - Version 1.2 This is a python extension that ru

/XNL-h4ck3r 364 Dec 30, 2022
User-friendly reference finder in IDA

IDARefHunter Updated: This project's been introduced on IDA Plugin Contest 2021! Why do we need RefHunter? Getting reference information in one specif

Jiwon 29 Dec 4, 2022
MassStringer, CTF Flag Finder

massStringer MassStringer, CTF Flag Finder Usage: python3 massStringer.py Enter absolute path of the directory to scan for flags Edit "flag = re.searc

SuperTsumu 4 Sep 6, 2022