0% found this document useful (0 votes)
642 views3 pages

Google Dorks List Hacker Colony

The document provides a comprehensive list of Google Dorks for ethical hacking, categorized into various sections such as Exposed Directories, Login Portals, Sensitive Files, Credential Leaks, Database Exposures, Open Cameras, Vulnerable Scripts, E-commerce Leaks, Email Harvesting, and Technology Fingerprinting. Each category contains specific search queries that can be used to identify vulnerabilities or sensitive information on websites. The document serves as a resource for ethical hackers to enhance their reconnaissance efforts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
642 views3 pages

Google Dorks List Hacker Colony

The document provides a comprehensive list of Google Dorks for ethical hacking, categorized into various sections such as Exposed Directories, Login Portals, Sensitive Files, Credential Leaks, Database Exposures, Open Cameras, Vulnerable Scripts, E-commerce Leaks, Email Harvesting, and Technology Fingerprinting. Each category contains specific search queries that can be used to identify vulnerabilities or sensitive information on websites. The document serves as a resource for ethical hackers to enhance their reconnaissance efforts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

HACKER COLONY

Google Dorks List for Ethical Hacking

Exposed Directories & Indexes


- intitle:"index of" "parent directory"

- intitle:"index of" site:example.com

- intitle:"index of" passwd

- intitle:"index of" .htaccess

- intitle:"index of" .env

- intitle:"index of" /backup

Login Portals & Admin Interfaces


- inurl:admin intitle:login

- inurl:admin/login

- intitle:"login" site:example.com

- inurl:"cpanel" OR intitle:"Control Panel"

- intitle:"admin page"

- inurl:"/wp-admin"

- inurl:"/login.php"

Sensitive Files & Configs


- filetype:env "DB_PASSWORD"

- filetype:conf "passwd"

- filetype:xml "password"

- filetype:log intext:"Warning"

- filetype:ini intext:"password"

- filetype:sql "insert into"

BY NEXORA
HACKER COLONY

- filetype:bak OR filetype:old OR filetype:backup

- inurl:config.php

Credential Leaks
- intext:"username" intext:"password" filetype:log

- intext:"login" intext:"password"

- filetype:txt intext:"password"

- filetype:xls intext:"email" intext:"password"

- filetype:csv intext:"@gmail.com"

Database Exposures
- filetype:sql "password"

- filetype:dbf "password"

- filetype:mdb "Users"

- intitle:"phpMyAdmin" "running on"

- inurl:"phpmyadmin"

Open Cameras & IoT Devices


- inurl:"/view.shtml"

- inurl:"/video.cgi"

- inurl:"webcamxp"

- intitle:"IP Camera [root@"

- intitle:"Live View / - AXIS"

Vulnerable Scripts / Error Messages


- inurl:"php?id=" intext:"Warning: mysql"

- inurl:"id=" intext:"You have an error in your SQL syntax"

BY NEXORA
HACKER COLONY

- intitle:"Index of /cgi-bin/"

- inurl:"/cgi-bin/"

- intext:"Warning: include"

E-commerce / Payment Leaks


- inurl:"shop/checkout" intitle:"Payment"

- intext:"credit card number" filetype:txt

- filetype:xls intext:"card number"

Email Harvesting
- intext:"@gmail.com" filetype:xls

- intext:"@example.com" filetype:csv

- intext:"email" filetype:xls

Technology Fingerprinting
- intitle:"Apache2 Ubuntu Default Page"

- intitle:"Welcome to nginx!"

- intitle:"Index of /" "nginx/"

- intitle:"index of /xampp"

- intitle:"Dashboard [Jenkins]"

- intitle:"Docker Registry"

BY NEXORA

You might also like