Google Dorking (also known as Google Hacking) is a technique used to uncover sensitive information exposed on the internet by leveraging advanced Google search operators.
filetype:log intext:"password"
filetype:txt intext:"username"
filetype:pdf intext:"confidential"
inurl:admin/login
inurl:dashboard
intitle:"index of" "admin"
intitle:"index of /" "parent directory"
intitle:"index of" site:example.com
inurl:/view/view.shtml
inurl:axis-cgi/jpg
inurl:top.htm inurl:currenttime
inurl:"config" filetype:xml
inurl:"wp-config.php"
inurl:config intitle:index.of
inurl:"phpmyadmin" intext:"Welcome to phpMyAdmin"
inurl:"/phpinfo.php"
filetype:sql "phpMyAdmin"
inurl:"/wp-content/plugins/"
inurl:".git" "index of"
inurl:"/cgi-bin/" ext:sh
intitle:"index of" inurl:ftp
inurl:"ftp://" site:example.com
- Use
robots.txt
to prevent Google from indexing sensitive pages. - Disable directory listing in the web server configuration.
- Use proper authentication to restrict access to sensitive files.
- Monitor logs to detect unauthorized access.
- Regularly update and patch software to avoid known exploits.
🚀 Contribute: If you have more useful Google Dorks, feel free to submit a pull request!
📧 Contact: If you have any questions, open an issue in the repo.
🔗 Follow for more updates: