gScan is a lightweight Python-based Google dorking automation tool designed for OSINT, reconnaissance, and bug bounty workflows. It helps security researchers quickly generate targeted Google search queries (dorks) to discover indexed subdomains, exposed files, login portals, and publicly accessible sensitive information.
This tool streamlines manual Google dorking by automating query generation and launching searches directly in the browser.
- Automated Google dork generation
- Subdomain discovery via search indexing
- Sensitive file discovery (PDF, logs, backups, configs)
- Login portal discovery
- Domain-focused search filtering
- Simple CLI-based workflow
- Browser-integrated search execution
- Python 3.x
- pyfiglet
- printy
git clone https://github.com/0x9Fahad/gScan
cd gScan
pip install pyfiglet
pip install printy
python3 gScan.py
-
Enter a target domain or IP address.
-
Choose a search option from the menu.
-
gScan will automatically open your browser and execute the selected Google dork.
-
Bug bounty reconnaissance
-
OSINT investigations
-
Discovering indexed sensitive files
-
Finding login panels
-
Subdomain discovery via search engines
This tool is intended for authorized security testing, OSINT, and educational purposes only. Users are responsible for complying with applicable laws and bug bounty program policies.