Saturday, August 11, 2012

Google Hacking Diggity Project

I was in DEFCON 20 a couple of weeks ago and was introduced to a few cool applications and I thought I should share them so I'll be posting making some posts introducing them the following weeks.

Today I want to introduce the Google Hacking Diggity Project,
Probably everyone reading this post  already knows about Google hacking (if not, start with, fast) but it is so much nicer to have one tool that will build all your queries for you.
Now despite the name, they do more than google.

Francis Brown and Rob Ragan have developed a search engine hacking tool arsenal that leverages Google, Bing and Shodan to quickly identify vulnerable systems or sensitive data leaks from corporate networks.

To start all you need to do is go to the link mentioned above and download search diggity from the attack tools menu.

some cool features include PortScan

NotInMyBackyard is becoming one of my favorites, allowing to search for passwords or sensitive information intentionally or recklessly posted on the net. The tool comes with pre-built queries that make it really easy to find information on pastebin, youtube, twitter, dropbox, googledocs and more.

Just try :
  1. type 'password' in the Query appender
  2. select from the locations list (inside cloud storage).
  3. from the extensions section choose XLS and XLSX
  4. look at all the documents you can find.

Try different settings for better results.


  1. Cheers, good information, is there any more tutorials specifically on the SearchDiggity tool?

    1. Hi, Great.. Tutorial is just awesome..It is really helpful for a newbie like me.. I am a regular follower of your blog. Really very informative post you shared here. Kindly keep blogging. If anyone wants to become a Front end developer learn from Javascript Training in Chennai . or learn thru Javascript Training in Chennai. Nowadays JavaScript has tons of job opportunities on various vertical industry. JavaScript Training in Chennai

  2. The abundance of cheats for some of the most popular games is proof that machines and computers are still often a poor match for the curiosity and cunning ability of the human mind jailbreak roblox cheat

  3. The method that our script uses is actually very complex and only experienced programmers and hackers can understand it. It basically grabs the URL of the victim and take the username Blue Portal

  4. This blog has left its gathering of spectators completely enchanted.
    paypal money hack

  5. It aims to secure the loopholes and breaches in the cyber-security system of a company. Legal hacking experts are usually Certified Ethical Hackers who are hired to prevent any potential threat to the computer security system or network.Wireless Hacking

  6. First off, hacks and viruses have become so common in the internet world that they are no longer looked at as "threats" by the general public and are seen as mere annoyances. hack FB

  7. As more and more people discover the many possibilities of having their own website, more of these pages are being created on the internet. It is essential that a website is created in more than just a way that is attractive to visitors. Visit, Secure Random Password It should also be protected in such a way that there is a higher level of security.

  8. This google is not bad but very hard action google in the word not hack google i'm very try again try again an fail but not supported google side