Skip to content

exploitdb.py is a Python script that retrieves and organizes Google Dorks from the exploit-db.com/google-hacking-database on Exploit-DB. It allows users to extract and save dorks in various formats for analysis and research purposes.

Notifications You must be signed in to change notification settings

zebbern/Exploitdb-Extracter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

ExploitDB Google Hacking Database Scraper

exploitdb.py is a Python script that retrieves and organizes Google Dorks from the Google Hacking Database (GHDB) on Exploit-DB. It allows users to extract and save dorks in various formats for analysis and research purposes.

Features

  • Scrape Google Dorks from Exploit-DB.
  • Organize dorks by category.
  • Save dorks to individual category files.
  • Save all dorks in a single text file.
  • Save the raw JSON response for detailed analysis.

Requirements

  • Python 3.x
  • Libraries:
    • requests
    • beautifulsoup4

Install the required libraries using pip:

pip install requests beautifulsoup4

Usage

Run the script with the following command-line options:

python exploitdb.py [options]

Options

Flag Description
-i Save individual dork categories to separate .txt files.
-j Save the raw GHDB JSON response to all_google_dorks.json.
-s Save all dorks to a single file, all_google_dorks.txt.
-h Show the help message and usage instructions.

Examples

  1. Save individual category files:

    python exploitdb.py -i
  2. Save the JSON response:

    python exploitdb.py -j
  3. Save all dorks to a single file:

    python exploitdb.py -s
  4. Perform all actions:

    python exploitdb.py -i -j -s

Output

The script creates a directory named dorks/ in the current working directory to store all output files.

  • Category Files (*.txt): Each dork category is saved to its own file in the dorks/ directory.
  • JSON File: The entire GHDB response is saved to dorks/all_google_dorks.json.
  • All Dorks File: A combined list of all extracted dorks is saved to dorks/all_google_dorks.txt.

Dork Categories

The script categorizes dorks into the following categories:

{
    "1": "Footholds",
    "2": "File Containing Usernames",
    "3": "Sensitive Directories",
    "4": "Web Server Detection",
    "5": "Vulnerable Files",
    "6": "Vulnerable Servers",
    "7": "Error Messages",
    "8": "File Containing Juicy Info",
    "9": "File Containing Passwords",
    "10": "Sensitive Online Shopping Info",
    "11": "Network or Vulnerability Data",
    "12": "Pages Containing Login Portals",
    "13": "Various Online Devices",
    "14": "Advisories and Vulnerabilities"
}

Contributing

Contributions are welcome! If you'd like to contribute to this project:

  1. Fork the repository.
  2. Create a feature branch (git checkout -b feature-name).
  3. Commit your changes (git commit -m 'Add new feature').
  4. Push to the branch (git push origin feature-name).
  5. Open a pull request.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Disclaimer

This tool is intended for educational and research purposes only. The misuse of this script can lead to legal consequences. Use responsibly and adhere to all relevant laws and guidelines.


Happy Dorking!

About

exploitdb.py is a Python script that retrieves and organizes Google Dorks from the exploit-db.com/google-hacking-database on Exploit-DB. It allows users to extract and save dorks in various formats for analysis and research purposes.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages