View Demo · Report Bug · Request Feature
Table of Contents
This script will automatically run through a list of Google searches, in order to automate Google Dorks for pen testing engagements.
Password spraying is an integral part of penetration testing. DUO's cloud-based SSO solution is growing increasingly popular, but few solutions exist for testing organizations using DUO SSO. This solution will perform a password spraying attack against a DUO SSO protal.
If DUO SSO is used as the identity provider for M365, the script will automatically pull the organization's SSO URL. Otherwise, a DUO SSO URL can be manually specified.
- Clone the repo
git clone https://github.com/LukeLauterbach/Google-Dorking-Automation.git
- Install the dependencies
git install -r requirements.txt
python3 duospray.py [OPTIONAL ARGUMENTS]
The script will look for files in the current directory named userlist.txt and passwords.txt. Alternatively, files can be specified using -u
and -p
.
Option | Description |
---|---|
-u | Username File (Defaults to userlist.txt in The Current Directory) |
-p | Password File (Defaults to passwords.txt in The Current Directory) |
-U | Duo URL (Defaults to Grabbing URL from M365) |
-d | Delay Between Unique Passwords |
-dr | Delay Between Individual Password Attempts (For Added Stealth) |
-db | Debug Mode |