Recon-Search-Assistant
A powerful and intuitive web-based search engine designed specifically for bug bounty hunters and security researchers. This tool provides quick access to various Google dorks and specialized searches to help identify potential security vulnerabilities and gather information about target domains.
Table of Contents
Loading contents...
README.md
Bug Bounty Search Engine
A powerful and intuitive web-based search engine designed specifically for bug bounty hunters and security researchers. This tool provides quick access to various Google dorks and specialized searches to help identify potential security vulnerabilities and gather information about target domains.
Features
- Comprehensive Search Categories:
- File & Directory Discovery
- Web Application Discovery
- Information Gathering
- Cloud & Infrastructure
- API & Development
-
Archives & Historical
-
User-Friendly Interface:
- Modern, responsive design
- Intuitive category-based organization
- Visual feedback for clicked searches
-
Dark theme optimized for extended use
-
Advanced Features:
- Google Custom Search API integration
- Search history tracking
- Direct links to specialized security tools
- Customizable API configuration
Setup Instructions
Google Custom Search API Setup (Optional):
- Create a project in the Google Cloud Console
- Enable the Custom Search API
- Create API credentials
- Create a Custom Search Engine at Google Programmable Search
- Configure the API key and Search Engine ID in the tool
Usage
- Open
dorking.html
in your web browser - Enter your target domain in the search field
- Click on any of the categorized search buttons to perform specialized searches
- Results will open in a new tab
- Use the “Reset Tracking” button to clear your search history
API Configuration
To use the Google Custom Search API:
- Click the “CSE API Key” button in the top-right corner
- Enter your API Key and Search Engine ID
- Click “Test Connection” to verify the setup
- Save the configuration
Categories Overview
File & Directory Discovery
- Directory listing vulnerabilities
- Exposed configuration files
- Database files
- Log files
- Backup files
- And more…
Web Application Discovery
- Login pages
- SQL errors
- phpinfo() pages
- WordPress installations
- Backdoors
- And more…
Information Gathering
- Pastebin entries
- LinkedIn employees
- Sensitive files
- Subdomains
- SSL certificates
- And more…
Cloud & Infrastructure
- AWS S3 buckets
- Jenkins instances
- Kubernetes dashboards
- Docker API
- Firebase instances
- And more…
API & Development
- GitHub dorks
- GraphQL endpoints
- API documentation
- Environment files
- And more…
Archives & Historical
- Archive.org searches
- Historical domain data
- Crossdomain.xml
- And more…
Contributing
Contributions are welcome! Please feel free to submit a Pull Request.
Acknowledgments
- Inspired by various bug bounty methodologies and tools
- Built with HTML, CSS, and JavaScript
- Uses Google Custom Search API for enhanced search capabilities
Disclaimer
This tool is intended for legitimate security research and bug bounty hunting purposes only. Always ensure you have proper authorization before testing any systems. The author is not responsible for any misuse of this tool.
Tool Information
Related Tools
burp_bug_finder
Automatic Bug finder with buprsuite
Stableapidetector
APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and flexible input/output options. Ideal for API security testing.
Stable