Googleinurl

[INFO]=> Menu SCANNER INURLBR - en

Aug 3rd, 2014
1,608
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. _ _ ______ _ _____
  2. | | | | ____| | | __ \
  3. | |__| | |__ | | | |__) |
  4. | __ | __| | | | ___/
  5. | | | | |____| |____| |
  6. |_| |_|______|______|_|
  7. ----------------------------------------------------------------------------------------------------------------------------------
  8. -h
  9. --help Alternative long length help command.
  10. --ajuda Command to specify Help.
  11. -q Choose which search engine you want through [1...13]:
  12. [options]:
  13. 1 - www.google.com.br
  14. 2 - www.bing.com
  15. 3 - br.search.yahoo.com
  16. 4 - www.ask.com
  17. 5 - search.hao123.com.br
  18. 6 - ajax.googleapis.com
  19. 7 - search.lycos.com
  20. 8 - busca.uol.com.br
  21. 9 - us.yhs4.search.yahoo.com
  22. 10 - pesquisa.sapo.pt
  23. 11 - www.dmoz.org
  24. 12 - www.gigablast.com
  25. 13 - web.search.naver.com
  26. all - All search engines
  27. Default: 1
  28. Example: -q {op}
  29. Usage: -q 1
  30. -q 5
  31. Using more than one engine: -q 1,2,5,6,11
  32. Using all engines: -q all
  33.  
  34. -p Choose which proxy you want to use through the search engine:
  35. Example: -p {proxy:port}
  36. Usage: -p localhost:8118
  37. -p socks5://googleinurl@localhost:9050
  38. -p http://admin:12334@172.16.0.90:8080
  39.  
  40. --tor-random Enables the TOR function, each usage links an unique IP.
  41.  
  42. -t Choose the validation type: op 1, 2, 3
  43. [options]:
  44. 1 - The first type uses default errors considering the script:
  45. It establishes connection with the exploit through the get method.
  46. demonstrativo: www.alvo.com.br/pasta/index.php?id={exploit}
  47.  
  48. 2 - The second type tries to valid the error defined by: -a='ALGO_DENTRO_ALVO'
  49. It also establishes connection with the exploit through the get method
  50. demonstrativo: www.alvo.com.br/pasta/index.php?id={exploit}
  51.  
  52. 3 - The third type combine both first and second types:
  53. Then, of course, it also establishes connection with the exploit through the get method
  54. Demo: www.alvo.com.br{exploit}
  55. Default: 1
  56. Example: -t {op}
  57. Usage: -t 1
  58.  
  59. DEFAULT ERRORS:
  60. CMS WORDPRESS, JDBC ERROR, MYSQL ERROR, MICROSOFT ERROR, ORACLE ERROR, POSTGRESQL ERROR,
  61. ZEND FRAMEWORK ERROR, PHP ERROR, ASP ERROR, LUA ERROR, INDEFINITE ERROR
  62.  
  63. --dork Defines which dork the search engine will use.
  64. Example: --dork {dork}
  65. Usage: --dork 'site:.gov.br inurl:php? id'
  66. - Using multiples dorks:
  67. Example: --dork {[DORK]dork1[DORK]dork2[DORK]dork3}
  68. Usage: --dork '[DORK]site:br[DORK]site:ar inurl:php[DORK]site:il inurl:asp'
  69.  
  70. --exploit-get Defines which exploit will be injected through the GET method to each URL found.
  71. Example: --exploit-get {exploit_get}
  72. Usage: --exploit-get '?´0x27;'
  73.  
  74. --exploit-post Defines which exploit will be injected through the POST method to each URL found.
  75. Example: --exploit-post {exploit_post}
  76. Usage: --exploit-post 'field1=valor1&field2=valor2&field3=?´0x273exploit;&botao=ok'
  77.  
  78. --exploit-comand Defines which exploit/parameter will be executed in the options: --comand-vul/--comand-all.
  79. The exploit-comand will be identified by the paramaters: --comand-vul/--comand-all como _EXPLOIT_
  80. Ex --exploit-comand '/admin/config.conf' --comand-all 'curl -v _TARGET__EXPLOIT_'
  81. _TARGET_ is the specified URL/TARGET obtained by the process
  82. _EXPLOIT_ is the exploit/parameter defined by the option --exploit-comand.
  83. Example: --exploit-comand {exploit-comand}
  84. Usage: --exploit-comand '/admin/config.conf'
  85.  
  86. -a Specify the string that will be used on the search script:
  87. Example: -a {string}
  88. Usage: -a '<title>hello world</title>'
  89.  
  90. -d Specify the script usage op 1, 2, 3, 4, 5, 6.
  91. Example: -d {op}
  92. Usage: -d 1 /URL of the search engine.
  93. -d 2 /Show all the url.
  94. -d 3 /Detailed request of every URL.
  95. -d 4 /Shows the HTML of every URL.
  96. -d 5 /Detailed request of all URLs.
  97.  
  98. -s Specify the output file where it will be saved the vulnerable URLs.
  99.  
  100. Example: -s {file}
  101. Usage: -s your_file.txt
  102.  
  103. -o Manually manage the vulnerable URLs you want to use from a file, without using a search engine.
  104. Example: -o {file_where_my_urls_are}
  105. Usage: -o tests.txt
  106.  
  107. -m Enable the search for emails on the urls specified.
  108.  
  109.  
  110. -u Enables the search for URL lists on the url specified.
  111.  
  112. --comand-vul Every vulnerable URL found will execute this command parameters.
  113. Example: --comand-vul {command}
  114. Usage: --comand-vul 'nmap sV -p 22,80,21 _TARGET_'
  115. --comand-vul './exploit.sh _TARGET_ output.txt'
  116.  
  117. --comand-all Use this commmand to specify a single command to EVERY URL found.
  118. Example: --comand-all {command}
  119. Usage: --comand-all 'nmap sV -p 22,80,21 _TARGET_'
  120. --comand-all './exploit.sh _TARGET_ output.txt'
  121.  
  122. Observation:
  123.  
  124. _TARGET_ will be replaced by the URL/target found, although if the user
  125. doesn't input the get, only the domain will be executed.
  126.  
  127. _TARGETFULL_ will be replaced by the original URL / target found.
  128.  
  129. _EXPLOIT_ will be replaced by the specified command argument --exploit-comand.
  130. The exploit-comand will be identified by the parameters --comand-vul / --comand-all as _EXPLOIT_
RAW Paste Data

Adblocker detected! Please consider disabling it...

We've detected AdBlock Plus or some other adblocking software preventing Pastebin.com from fully loading.

We don't have any obnoxious sound, or popup ads, we actively block these annoying types of ads!

Please add Pastebin.com to your ad blocker whitelist or disable your adblocking software.

×