Google Mass Explorer (PYTHON 3.6)
This is an automated robot for google search engine.
Make a google search, and parse the results for a specific exploit you define. The options can be listed with –help parameter.
Installation
Install these packages:
libxml2-dev libxslt1-dev python-dev
This project is developed in PYTHON 3.6 Make sure u use pip3 (package: python3-pip) to install dep:
$ sudo pip3 install -r requirements
Make sure u have installed chromedriver, if you don't have this tutorial can help:
https://developers.supportbee.com/blog/setting-up-cucumber-to-run-with-Chrome-on-Linux/
Install this version for stability: http://chromedriver.storage.googleapis.com/index.html?path=2.24/
Usage
google_explorer.py --dork=<arg> --browser=<arg> [--exploit_parser=<arg>]
[--language=<arg>]
[--location=<arg>]
[--last_update=<arg>]
[--google_domain=<arg>]
[--proxy=<arg>]
google_explorer.py --xpl_filter=<arg>
google_explorer.py --help
google_explorer.py --version
Options:
-h --help Open help menu
-v --version Show version
Required options:
--dork='google dork' your favorite g00gle dork :)
--browser='browser' chrome
chromium
--xpl_filter='exploits filters list' joomla_cve_2015_8562
wordpress_cve_2015_1579
joomla_cve_2016_8870
apache_rce_struts2_cve_2017_5638
Optional options:
--language='page language' Portuguese
English
Arabic
Romanian
...
...
--location='server location' Brazil
Mauritania
Tunisia
Marroco
Japan
...
...
--last_update='page last update' anytime
past 24 hours
past week
past month
past year
--google_domain='google domain' google domain to use on search.
Ex: google.co.uk
--proxy='ip:port' proxy ip:port
Make a search with google bot, here are some examples:
python3 google_explorer.py --browser='chrome' --dork='site:gob.ve inurl:index.php' --location="Venezuela"
python3 google_explorer.py --dork="index.php?option=" --browser="chrome" --google_domain="google.co.il" --location="איחוד האמירויות הערביות"
python3 google_explorer.py --browser='chrome' --dork='inurl:index.php?option' --location="Rússia" --last_update='na última semana'
Run the exploit filter for the specific vulnerability u are looking for, to check if results can or not be vulnerable:
$ python3 google_explorer.py --xpl_filter='joomla_cve_2015_8562'
$ python3 google_explorer.py --xpl_filter='apache_rce_struts2_cve_2017_5638'
$ python3 google_explorer.py --xpl_filter='exploit filter name from list'
For some exploits, I’m making some utils script to help the exploitation. But not ready yet.. 🙂
Run the exploiter.py (if the original exploit run by command line – READ THE EXPLOIT BEFORE USING IT):
$ cd exploits
$ python2 exploiter.py --file <vuln file>
Copyright (c) 2016 anarc0der
Source: https://github.com/anarcoder/