-
-
Save linglung/0c78b049746c53a9add3b0c17617b3ff to your computer and use it in GitHub Desktop.
Listing of a number of useful Google dorks.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
" _ _ " | |
" _ /|| . . ||\ _ " | |
" ( } \||D ' ' ' C||/ { % " | |
" | /\__,=_[_] ' . . ' [_]_=,__/\ |" | |
" |_\_ |----| |----| _/_|" | |
" | |/ | | | | \| |" | |
" | /_ | | | | _\ |" | |
It is all fun and games until someone gets hacked! | |
------------------------------------------------------------------------------------------ | |
Explanations: | |
cache: If you include other words in the query, Google will highlight those words within | |
the cached document. For instance, [cache:www.google.com web] will show the cached | |
content with the word “web” highlighted. This functionality is also accessible by | |
clicking on the “Cached” link on Google’s main results page. The query [cache:] will | |
show the version of the web page that Google has in its cache. For instance, | |
[cache:www.google.com] will show Google’s cache of the Google homepage. Note there | |
can be no space between the “cache:” and the web page url. | |
------------------------------------------------------------------------------------------ | |
link: The query [link:] will list webpages that have links to the specified webpage. | |
For instance, [link:www.google.com] will list webpages that have links pointing to the | |
Google homepage. Note there can be no space between the “link:” and the web page url. | |
------------------------------------------------------------------------------------------ | |
related: The query [related:] will list web pages that are “similar” to a specified web | |
page. For instance, [related:www.google.com] will list web pages that are similar to | |
the Google homepage. Note there can be no space between the “related:” and the web | |
page url. | |
------------------------------------------------------------------------------------------ | |
info: The query [info:] will present some information that Google has about that web | |
page. For instance, [info:www.google.com] will show information about the Google | |
homepage. Note there can be no space between the “info:” and the web page url. | |
------------------------------------------------------------------------------------------ | |
define: The query [define:] will provide a definition of the words you enter after it, | |
gathered from various online sources. The definition will be for the entire phrase | |
entered (i.e., it will include all the words in the exact order you typed them). | |
------------------------------------------------------------------------------------------ | |
stocks: If you begin a query with the [stocks:] operator, Google will treat the rest | |
of the query terms as stock ticker symbols, and will link to a page showing stock | |
information for those symbols. For instance, [stocks: intc yhoo] will show information | |
about Intel and Yahoo. (Note you must type the ticker symbols, not the company name.) | |
------------------------------------------------------------------------------------------ | |
site: If you include [site:] in your query, Google will restrict the results to those | |
websites in the given domain. For instance, [help site:www.google.com] will find pages | |
about help within www.google.com. [help site:com] will find pages about help within | |
.com urls. Note there can be no space between the “site:” and the domain. | |
------------------------------------------------------------------------------------------ | |
allintitle: If you start a query with [allintitle:], Google will restrict the results | |
to those with all of the query words in the title. For instance, | |
[allintitle: google search] will return only documents that have both “google” | |
and “search” in the title. | |
------------------------------------------------------------------------------------------ | |
intitle: If you include [intitle:] in your query, Google will restrict the results | |
to documents containing that word in the title. For instance, [intitle:google search] | |
will return documents that mention the word “google” in their title, and mention the | |
word “search” anywhere in the document (title or no). Note there can be no space | |
between the “intitle:” and the following word. Putting [intitle:] in front of every | |
word in your query is equivalent to putting [allintitle:] at the front of your | |
query: [intitle:google intitle:search] is the same as [allintitle: google search]. | |
------------------------------------------------------------------------------------------ | |
allinurl: If you start a query with [allinurl:], Google will restrict the results to | |
those with all of the query words in the url. For instance, [allinurl: google search] | |
will return only documents that have both “google” and “search” in the url. Note | |
that [allinurl:] works on words, not url components. In particular, it ignores | |
punctuation. Thus, [allinurl: foo/bar] will restrict the results to page with the | |
words “foo” and “bar” in the url, but won’t require that they be separated by a | |
slash within that url, that they be adjacent, or that they be in that particular | |
word order. There is currently no way to enforce these constraints. | |
------------------------------------------------------------------------------------------ | |
inurl: If you include [inurl:] in your query, Google will restrict the results to | |
documents containing that word in the url. For instance, [inurl:google search] will | |
return documents that mention the word “google” in their url, and mention the word | |
“search” anywhere in the document (url or no). Note there can be no space between | |
the “inurl:” and the following word. Putting “inurl:” in front of every word in your | |
query is equivalent to putting “allinurl:” at the front of your query: | |
[inurl:google inurl:search] is the same as [allinurl: google search]. | |
------------------------------------------------------------------------------------------ | |
Nina Simone intitle:”index.of” “parent directory” “size” “last modified” “description” I Put A Spell On You (mp4|mp3|avi|flac|aac|ape|ogg) -inurl:(jsp|php|html|aspx|htm|cf|shtml|lyrics-realm|mp3-collection) -site:.info | |
Bill Gates intitle:”index.of” “parent directory” “size” “last modified” “description” Microsoft (pdf|txt|epub|doc|docx) -inurl:(jsp|php|html|aspx|htm|cf|shtml|ebooks|ebook) -site:.info | |
parent directory /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums | |
parent directory DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums | |
parent directory Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums | |
parent directory Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums | |
parent directory MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums | |
parent directory Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums | |
filetype:config inurl:web.config inurl:ftp | |
“Windows XP Professional” 94FBR | |
ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:"budget approved") inurl:confidential | |
ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:”budget approved”) inurl:confidential | |
ext:inc "pwd=" "UID=" | |
ext:ini intext:env.ini | |
ext:ini Version=... password | |
ext:ini Version=4.0.0.4 password | |
ext:ini eudora.ini | |
ext:ini intext:env.ini | |
ext:log "Software: Microsoft Internet Information Services *.*" | |
ext:log "Software: Microsoft Internet Information | |
ext:log "Software: Microsoft Internet Information Services *.*" | |
ext:log \"Software: Microsoft Internet Information Services *.*\" | |
ext:mdb inurl:*.mdb inurl:fpdb shop.mdb | |
ext:mdb inurl:*.mdb inurl:fpdb shop.mdb | |
ext:mdb inurl:*.mdb inurl:fpdb shop.mdb | |
filetype:SWF SWF | |
filetype:TXT TXT | |
filetype:XLS XLS | |
filetype:asp DBQ=" * Server.MapPath("*.mdb") | |
filetype:asp "Custom Error Message" Category Source | |
filetype:asp + "[ODBC SQL" | |
filetype:asp DBQ=" * Server.MapPath("*.mdb") | |
filetype:asp DBQ=\" * Server.MapPath(\"*.mdb\") | |
filetype:asp “Custom Error Message” Category Source | |
filetype:bak createobject sa | |
filetype:bak inurl:"htaccess|passwd|shadow|htusers" | |
filetype:bak inurl:\"htaccess|passwd|shadow|htusers\" | |
filetype:conf inurl:firewall -intitle:cvs | |
filetype:conf inurl:proftpd. PROFTP FTP server configuration file reveals | |
filetype:dat "password.dat | |
filetype:dat \"password.dat\" | |
filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To" | |
filetype:eml eml +intext:\"Subject\" +intext:\"From\" +intext:\"To\" | |
filetype:eml eml +intext:”Subject” +intext:”From” +intext:”To” | |
filetype:inc dbconn | |
filetype:inc intext:mysql_connect | |
filetype:inc mysql_connect OR mysql_pconnect | |
filetype:log inurl:"password.log" | |
filetype:log username putty PUTTY SSH client logs can reveal usernames | |
filetype:log “PHP Parse error” | “PHP Warning” | “PHP Error” | |
filetype:mdb inurl:users.mdb | |
filetype:ora ora | |
filetype:ora tnsnames | |
filetype:pass pass intext:userid | |
filetype:pdf "Assessment Report" nessus | |
filetype:pem intext:private | |
filetype:properties inurl:db intext:password | |
filetype:pst inurl:"outlook.pst" | |
filetype:pst pst -from -to -date | |
filetype:reg reg +intext:"defaultusername" +intext:"defaultpassword" | |
filetype:reg reg +intext:\"defaultusername\" +intext:\"defaultpassword\" | |
filetype:reg reg +intext:â? WINVNC3â? | |
filetype:reg reg +intext:”defaultusername” +intext:”defaultpassword” | |
filetype:reg reg HKEY_ Windows Registry exports can reveal | |
filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS | |
filetype:sql "insert into" (pass|passwd|password) | |
filetype:sql ("values * MD5" | "values * password" | "values * encrypt") | |
filetype:sql (\"passwd values\" | \"password values\" | \"pass values\" ) | |
filetype:sql (\"values * MD\" | \"values * password\" | \"values * encrypt\") | |
filetype:sql +"IDENTIFIED BY" -cvs | |
filetype:sql password | |
filetype:sql password | |
filetype:sql “insert into” (pass|passwd|password) | |
filetype:url +inurl:"ftp://" +inurl:";@" | |
filetype:url +inurl:\"ftp://\" +inurl:\";@\" | |
filetype:url +inurl:”ftp://” +inurl:”;@” | |
filetype:xls inurl:"email.xls" | |
filetype:xls username password email | |
index of: intext:Gallery in Configuration mode | |
index.of passlist | |
index.of perform.ini mIRC IRC ini file can list IRC usernames and | |
index.of.dcim | |
index.of.password | |
intext:" -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) | |
intext:""BiTBOARD v2.0" BiTSHiFTERS Bulletin Board" | |
intext:"# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd | |
intext:"#mysql dump" filetype:sql | |
intext:"#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3 | |
intext:"A syntax error has occurred" filetype:ihtml | |
intext:"ASP.NET_SessionId" "data source=" | |
intext:"About Mac OS Personal Web Sharing" | |
intext:"An illegal character has been found in the statement" -"previous message" | |
intext:"AutoCreate=TRUE password=*" | |
intext:"Can't connect to local" intitle:warning | |
intext:"Certificate Practice Statement" filetype:PDF | DOC | |
intext:"Certificate Practice Statement" inurl:(PDF | DOC) | |
intext:"Copyright (c) Tektronix, Inc." "printer status" | |
intext:"Copyright © Tektronix, Inc." "printer status" | |
intext:"Emergisoft web applications are a part of our" | |
intext:"Error Diagnostic Information" intitle:"Error Occurred While" | |
intext:"Error Message : Error loading required libraries." | |
intext:"Establishing a secure Integrated Lights Out session with" OR intitle:"Data Frame - Browser not HTTP 1.1 compatible" OR intitle:"HP Integrated Lights- | |
intext:"Fatal error: Call to undefined function" -reply -the -next | |
intext:"Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed." -edu | |
intext:"Generated by phpSystem" | |
intext:"Generated by phpSystem" | |
intext:"Host Vulnerability Summary Report" | |
intext:"HostingAccelerator" intitle:"login" +"Username" -"news" -demo | |
intext:"IMail Server Web Messaging" intitle:login | |
intext:"Incorrect syntax near" | |
intext:"Index of" /"chat/logs" | |
intext:"Index of /network" "last modified" | |
intext:"Index of /" +.htaccess | |
intext:"Index of /" +passwd | |
intext:"Index of /" +password.txt | |
intext:"Index of /admin" | |
intext:"Index of /backup" | |
intext:"Index of /mail" | |
intext:"Index of /password" | |
intext:"Microsoft (R) Windows * (TM) Version * DrWtsn32 Copyright (C)" ext:log | |
intext:"Microsoft CRM : Unsupported Browser Version" | |
intext:"Microsoft ® Windows * ™ Version * DrWtsn32 Copyright ©" ext:log | |
intext:"Network Host Assessment Report" "Internet Scanner" | |
intext:"Network Vulnerability Assessment Report" | |
intext:"Network Vulnerability Assessment Report" | |
intext:"Network Vulnerability Assessment Report" 本文来自 pc007.com | |
intext:"SQL Server Driver][SQL Server]Line 1: Incorrect syntax near" | |
intext:"Thank you for your order" +receipt | |
intext:"Thank you for your order" +receipt | |
intext:"Thank you for your purchase" +download | |
intext:"The following report contains confidential information" vulnerability -search | |
intext:"phpMyAdmin MySQL-Dump" "INSERT INTO" -"the" | |
intext:"phpMyAdmin MySQL-Dump" filetype:txt | |
intext:"phpMyAdmin" "running on" inurl:"main.php" | |
intextpassword | passcode) intextusername | userid | user) filetype:csv | |
intextpassword | passcode) intextusername | userid | user) filetype:csv | |
intitle:"index of" +myd size | |
intitle:"index of" etc/shadow | |
intitle:"index of" htpasswd | |
intitle:"index of" intext:connect.inc | |
intitle:"index of" intext:globals.inc | |
intitle:"index of" master.passwd | |
intitle:"index of" master.passwd 007电脑资讯 | |
intitle:"index of" members OR accounts | |
intitle:"index of" mysql.conf OR mysql_config | |
intitle:"index of" passwd | |
intitle:"index of" people.lst | |
intitle:"index of" pwd.db | |
intitle:"index of" spwd | |
intitle:"index of" user_carts OR user_cart | |
intitle:"index.of *" admin news.asp configview.asp | |
intitle:("TrackerCam Live Video")|("TrackerCam Application Login")|("Trackercam Remote") -trackercam.com | |
intitle:(“TrackerCam Live Video”)|(“TrackerCam Application Login”)|(“Trackercam Remote”) -trackercam.com | |
inurl:admin inurl:userlist Generic userlist files | |
------------------------------------------------------------------------------------------ | |
Using special search string to find vulnerable websites: | |
inurl:php?=id1 | |
inurl:index.php?id= | |
inurl:trainers.php?id= | |
inurl:buy.php?category= | |
inurl:article.php?ID= | |
inurl:play_old.php?id= | |
inurl:declaration_more.php?decl_id= | |
inurl:pageid= | |
inurl:games.php?id= | |
inurl:page.php?file= | |
inurl:newsDetail.php?id= | |
inurl:gallery.php?id= | |
inurl:article.php?id= | |
inurl:show.php?id= | |
inurl:staff_id= | |
inurl:newsitem.php?num= andinurl:index.php?id= | |
inurl:trainers.php?id= | |
inurl:buy.php?category= | |
inurl:article.php?ID= | |
inurl:play_old.php?id= | |
inurl:declaration_more.php?decl_id= | |
inurl:pageid= | |
inurl:games.php?id= | |
inurl:page.php?file= | |
inurl:newsDetail.php?id= | |
inurl:gallery.php?id= | |
inurl:article.php?id= | |
inurl:show.php?id= | |
inurl:staff_id= | |
inurl:newsitem.php?num= |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment