Attack Tools

Sometimes, the best defense is a good offense. Bishop Fox’s attack tools for Google Hacking level the playing field by allowing our clients to find information disclosures and exposed vulnerabilities before others do. Arm yourself with our arsenal of attack tools that leverage Google, Bing, and other popular search engines.


SearchDiggity v 3


SearchDiggity 3.1 is the primary attack tool of the Google Hacking Diggity Project. It is Bishop Fox’s MS Windows GUI application that serves as a front-end to the most recent versions of our Diggity tools: GoogleDiggity, BingDiggity, Bing LinkFromDomainDiggity, CodeSearchDiggity, DLPDiggity, FlashDiggity, MalwareDiggity, PortScanDiggity, SHODANDiggity, BingBinaryMalwareSearch, and NotInMyBackYard Diggity.

SearchDiggity - Tool List

SearchDiggity – Tool List

Note: To avoid Google/Bing bot detection which causes SearchDiggity to pause and display the error “Auto-resuming in 15 minutes.“, see this blog post on using the official APIs provided by Google/Bing/SHODAN.


MSI installation file. Major updates 13 Jun 2013.

  • New: Bishop Fox edition
  • Significantly updated CHM help file. Go to menu Help -> Contents to see.
  • Migration to new Bing Search API (Windows Azure Marketplace)
  • Migration to Bishop Fox branding beginning
  • Other bug fixes and performance tweaks.
  • More updates on the way soon, so stay tuned!

Requires: Microsoft .NET Framework v4

Hacking Dictionaries

Bing Hacking Database - BHDB v2

bhdb2.0-v2Exploiting recent API changes and undocumented features within Bing, we’ve been able to completely overcome the previous Bing hacking limitations (such as the disabling of the inurl:, link: and linkdomain: search operators) to create an entirely new BHDB v2.0 that makes Bing hacking just as effective as Google hacking (if not more so) for uncovering vulnerabilities and data leaks on the web.

For example, Bing now has ability to use the ext: search operator, which previously didn’t exist. Bing also now has the ability to mimic Google’s inurl: search operator by using Bing’s instreamset:url: search operator.


The BHDB v2.0 also includes an entirely new SharePoint Bing Hacking database, containing attack strings targeting Microsoft SharePoint deployments via Bing.


Bing Hacking Database (BHDB) v2.0.txt

BHDB v2.0 Dictionary file

SharePoint - Google and Bing Hacking Dictionary Files

New GoogleDiggity input dictionary file contains 121 queries that allow users to uncover SharePoint specific vulnerabilities exposed via the Google search engine. This dictionary helps assessors locate exposures of common SharePoint administrative pages, web services, and site galleries that an organization typically would not want to be made available to the public, let alone indexed by Google.


It can be imported for use within the SearchDiggity GUI tool from the menu: “File”->”Import Query Definition”.

Recently, we’ve also created a Bing hacking dictionary that can be imported into BingDiggity and used to identify SharePoint exposures as well.



SharePoint GoogleDiggity Dictionary.txt

Updated: 18 March 2012
Queries that allow users to uncover SharePoint specific vulnerabilities exposed via the Google search engine.

SharePoint BingDiggity Dictionary.txt

Updated: 16 August 2013
Bing queries that allow users to uncover SharePoint specific vulnerabilities exposed via the Bing search engine.

GHDB Reborn Dictionaries - Exploit-DB

The good folks over at were kind enough to pick up where Johnny Long left off and resurrect the GHDB. They now maintain an updated version of the GHDB in a project labeled Google Hacking Database Reborn.

GHDB Reborn - New-v2

In that same spirit, we at the Diggity project were kind enough to translate their efforts into GoogleDiggity compatible input text files. These dorks are included with the standard SearchDiggity dictionary set, and can also be downloaded below.


GHDB Reborn Dictionary.txt

UPDATED: 21Sep2011 GHDB Reborn - 21Sept2011.  Includes original dorks from Johnny Long's GHDB.

GHDB Reborn Dictionary - NEW ONLY.txt

UPDATED: 21Sep2011 GHDB Reborn.  Only NEW Google dorks added since Johnny Long original GHDB.

SHODAN Hacking Database - SHDB

SHODAN - LogoThe new SHODAN Hacking Database (SHDB) input dictionary file containing 167 queries that allow users to uncover interesting information via the SHODAN search engine. This dictionary helps target various technologies including webcams, printers, VoIP devices, routers, switches, and even SCADA/Industrial Control Systems (ICS) just to name a few. This dictionary comes preloaded with SHODAN Diggity (part of the SearchDiggity attack tool suite), which provides an easy-to-use scanning interface to the popular SHODAN hacking search engine, using the SHODAN API.

SHODAN is a search engine that lets you find specific types of computers (routers, servers, etc.) using a variety of filters.  Some have also described it as a search engine of service banners. Shodan collects data mostly on web servers at the moment (port 80), but there is also some data from FTP (21), SSH (22) and Telnet (23) services.

Web search engines, such as Google and Bing, are great for finding websites. But what if you’re interested in finding computers running a certain piece of software (such as Apache)? Or you want to see how many anonymous FTP servers there are? Maybe a new vulnerability came out and you want to see how many hosts it could infect? Traditional web search engines don’t let you answer those questions.


SHODAN Hacking Database (SHDB).txt

SHDB Dictionary file. UPDATED: 21Jun2013