Katana-ds: A Python Tool For Google Hacking

Katana-ds: A Python Tool For Google Hacking

Named after the legendary Japanese sword, Katana-ds is a dork scanner which allows the user to search for vulnerable websites or IOT devices. There are 4 modes available in this software which allow the user to search through Google and the dark web for vulnerable targets. This tool can also be used to search for active Scada devices and for active proxy servers. When used in combination with other software’s, it can provide the user with a powerful Google Hacking combination.

Katana-ds: Dork Scanner

After the scanner has been started, it will ask the user for a mode. If the user selects Google mode, he will enter in a target dork, and Katana-ds will return a list of websites containing the target dork. On selection of Scada mode, the scanner will automatically start to return a list of online Scada devices. Tor mode will allow the user to anonymously search for websites containing the target query through dark web search engines Phobos, Tor66 and Tordex. Selection of proxy server will automatically return a list of 100 online proxy servers.


  • Search through Google for vulnerable websites
  • Search through the dark web for vulnerable websites
  • Easy to use
  • Search for online Scada devices and proxies
  • Instant results

Supported Platforms:

  • Linux
  • Windows


  • Python 3+ (3.7 and 3.8)
  • Tor
  • pip package installer

Install Katana-ds

Clone the GitHub repo:

$ git clone https://github.com/adnane-X-tebbaa/Katana.git

Navigate to the working directory and install the requirements:

$ cd Katana
$ python3 -m pip install -r requirements.txt


Run the python script with the required mode:

$ python3 kds.py -h (for help)
Options : 
-g :for google mode 
-s :for scada mode 
-t :for tor mode 
-p :for proxy mode  
                    R                                                           V1.5.3
    Katana Dork Scanner (Katana-DS) coded by adnane-X-tebbaa 
    please use -h to see help
usage: katana-ds.py [-h] [-g] [-s] [-t] [-p]
optional arguments:
  -h, --help    show this help message and exit
  -g, --google  google mode
  -s, --scada   scada mode 
  -t, --tor     Tor mode 
  -p, --proxy   Proxy mode 

Possible Errors in Tor Mode (solutions in bold):

The script print ‘HTTP Error 429 too many requests’:
change the TLD
The script print ‘urllib.error.URLError Errno 1104’ :
check if the TLD is true
Changing the TLD don’t work: (2 solutions)
1- Change your ip by disconnecting and reconnecting again or use a good VPN.
2- Delete the google-cookie file in Katana Directory.
Tor mode show ‘Failed to establish a new connection’:
make sure that tor proxy up and running on port 9050
Documentation Box
Download Box