Enola is a powerful social-media reconnaissance tool with an advanced Google Dork generation mode for precise searching and URL discovery.
- Fast generation of Google Dork payloads and targeted queries
- Multiple input modes: single query, lists of queries, sites and payloads
- Proxy support for high-volume searches and rate-limit avoidance
- Verbose logging with multiple levels (info → response)
- Cross-platform installer for Linux-based systems and Windows
Run the bundled installer with root privileges:
./install.shThis will install enola as a global command (typically under /usr/bin).
If you are on Termux without root, installing to /usr/bin is not possible. Consider using Kali NetHunter (rootless) or installing enola into a local bin directory in your home (e.g. ~/.local/bin) and adding it to your PATH.
Reference: https://www.kali.org/docs/nethunter/nethunter-rootless/
Run the provided install.bat as Administrator to register enola as a global command.
If you prefer not to run an installer with elevated permissions, download the standalone executable from the releases page.
Basic scan with a simple target:
enola --target fooRun with Google Dork generation and a proxy list:
enola --target foo --google-dork-mode --proxies my-proxies.txtImportant
Always use a proxy list or otherwise throttle requests to avoid being rate-limited or blocked by Google.
The primary specialized mode is Google Dork Mode, which dynamically composes dork payloads using your queries, site lists and payload templates.
When enabled, Enola creates payload dorks by combining: queries, site placeholders, and payload templates. This greatly increases precision for targeted search discovery.
Example:
enola --target foo --google-dork-mode --proxies proxies.txtNote
Google imposes rate limits. Use proxies or low parallelism settings to avoid blocks.
Provide a single query file containing one query per line:
enola --target foo --query myqueries.txtA payload template may include SITE and STRING placeholders that will be substituted at runtime:
enola --target foo --payload "intitle:STRING inurl:SITE" --google-dork-modeSITE will be replaced by entries from your sites list, and STRING by your queries or keywords.
Supply lists of payload templates and/or site hosts to use instead of the built-in defaults:
enola --target foo --sites mysites.txt --payloads mypayloads.txtControl output granularity with --verbose <level>.
| Name | Level | Description |
|---|---|---|
| Info | 1 | Informational messages |
| Warn | 2 | Warnings |
| Error | 3 | Errors only |
| Found | 4 | Show discovered results |
| NotFound | 5 | Report payloads that returned nothing |
| Debug | 6 | Debug output |
| Request | 7 | Request-level details |
| Response | 8 | Full response details (headers/body) |
Search with a custom payload and site list:
enola --target "company-name" --sites mysites.txt --payload "inurl:SITE intitle:STRING"Run using a query list and proxies:
enola --target "foo" --query queries.txt --proxies proxies.txt --google-dork-mode- Rate limits: Google actively rate-limits and blocks automated searches. Use a proxy pool and sensible request pacing.
Enola is released under the MIT License.