Skip to content
Reconnaissance

Google Dorking Cheat Sheet

Search operators for finding vulnerabilities

Basic Operators

TEXT
site:target.com          # Only results from domain
inurl:admin             # URL contains "admin"
intitle:login           # Page title contains "login"
filetype:pdf            # Specific file type
intext:password         # Page content contains "password"

Finding Sensitive Files

TEXT
# Configuration files
site:target.com ext:xml | ext:conf | ext:cnf | ext:cfg

# Backup files
site:target.com ext:bak | ext:backup | ext:old

# Log files
site:target.com ext:log

# Database files
site:target.com ext:sql | ext:db | ext:sqlite

# Environment files
site:target.com inurl:.env | .env.local

Finding Exposed Data

TEXT
# Password files
site:target.com intext:"password" filetype:txt

# API keys
site:target.com intext:"api_key" | intext:"apikey"

# AWS keys
site:target.com intext:"AKIA"

# Private keys
site:target.com intext:"BEGIN RSA PRIVATE KEY"

Finding Admin Panels

TEXT
site:target.com inurl:admin
site:target.com inurl:login | inurl:signin
site:target.com intitle:"admin panel"
site:target.com inurl:dashboard
site:target.com inurl:wp-admin
site:target.com inurl:administrator

Finding Vulnerabilities

TEXT
# Directory listing
site:target.com intitle:"Index of /"

# Error messages
site:target.com intext:"Warning: mysql"
site:target.com intext:"SQL syntax"
site:target.com intext:"Fatal error"

# phpinfo
site:target.com inurl:phpinfo.php
site:target.com intitle:"phpinfo()"

Finding Subdomains

TEXT
site:*.target.com -www
site:*.*.target.com

GitHub Dorking

TEXT
# Search GitHub for secrets
"target.com" password
"target.com" api_key
"target.com" secret
org:targetorg password

Useful Tools

BASH
# Automate dorking
googler "site:target.com filetype:pdf"

# GitHub dorks
gitrob -threads 10 target-org
truffleHog https://github.com/target/repo

Combined Dorks

TEXT
# Sensitive directories
site:target.com inurl:"/admin/" | inurl:"/backup/" | inurl:"/config/"

# Exposed credentials
site:target.com allintext:username password filetype:log

# Open redirects
site:target.com inurl:redirect | inurl:url= | inurl:next=
On this page