b0d0rk is a lightweight reconnaissance tool designed to help bug bounty hunters and security researchers automate Google dork queries during the passive information-gathering phase. It focuses on identifying publicly indexed, potentially sensitive endpoints such as exposed files, admin panels, backup files, configuration leaks, and security policy pages — strictly using search engine results.
The tool is fast, scriptable, and Bash-friendly, making it ideal for early-stage recon workflows.
- Automated execution of Google dorks
- Target-based searching (
site:target.com) - Supports custom dork lists
- Clean, readable output
- Bash-compatible & lightweight
- Designed for authorized bug bounty programs only
- Bug bounty reconnaissance
- Security research
- Finding exposed files & endpoints
- Locating bug bounty / disclosure pages
- Passive OSINT collection
git clone https://github.com/b0dj0x/b0d0rk.git
cd b0d0rkchmod +x b0d0rk.shNo heavy dependencies required — works with standard Linux tools (
bash,curl).
./b0d0rk.sh The tool automatically converts these into:
site:example.com inurl:admin
site:example.com ext:env
b0d0rk is intended only for educational purposes and authorized testing.
Use only on domains you own or that are explicitly in scope of a bug bounty or penetration testing program.
The author is not responsible for misuse.