best_google_dork
"/home/yossef/notes/personal/hacking/best_google_dork.md"
path: personal/hacking/best_google_dork.md
- **fileName**: best_google_dork
- **Created on**: 2026-01-01 16:46:39
simple dorks (general)
site:.edu “phone number”: – This Dork searches for websites on .edu
domains that contain the words “phone number”.
student “phone number”: – This Dork searches for websites on .edu
domains that contain the words “student” and “phone number”.
inurl:edu “login”: – This Dork searches for websites on .edu domains that
contain the words “login”. This Dork searches for school websites that
contain student login information.
“powered by vbulletin” site:.edu: – This Dork searches for websites on .edu
domains that contain the words “powered by vbulletin”. This Dork searches for
school websites that are running on the vbulletin forum software.
“powered by vbulletin” site:.gov: – This Dork searches for websites on .gov
domains that contain the words “powered by vbulletin”. This Dork searches
for governmental websites that are running on the vbulletin forum software.
“powered by vbulletin” site:.mil: – This Dork searches for websites on .mil
domains that contain the words “powered by vbulletin”. This Dork searches for
military websites that are running on the vbulletin forum software.
“powered by vbulletin” inurl:.edu: – This Dork searches for websites on .edu
domains that contain the words “powered by vbulletin”. This Dork searches for
school websites that are running on the vbulletin forum software.
“powered by vbulletin” inurl:.mil: – This Dork searches for websites on .mil
domains that contain the words “powered by vbulletin”. This Dork searches for
military websites that are running on the vbulletin forum software.
inurl:.com “powered by vbulletin”: – This Dork searches for websites on .com
domains that contain the words “powered by vbulletin”. This Dork searches for
websites that are running on the vbulletin forum software.
inurl:.edu “register forum”: – This Dork searches for websites on .edu domains
that contain the words “register forum”. This Dork searches for school websites
that allow you to register for a forum.
inurl:.gov “register forum”: – This Dork searches for websites on .gov
domains that contain the words “register forum”. This Dork searches for
governmental websites that allow you to register for a forum.
Search for Files Containing Usernames
These dorks target server indexes, database dumps, and configuration files
that often leak user identities.
- Directory Listings:
intitle:"index of" "/usernames" - Database Files:
intitle:index.of "users.db"|
intitle:"index of" "users.sql" - Contacts/Profiles:
intitle:"index of" "contacts.txt"|
inurl:/profile.php?lookup=1
Configuration & Logs
- System Logs:
allintext:username filetype:log - App Configs:
intitle:"index of" "credentials.xml"|
intitle:"index of" "db.properties" - Environment Files:
intitle:"index of" "/parameters.yml*"
Spreadsheets & Office Docs
- Excel Lists:
"username.xlsx" ext:xlsx - SQL Dumps:
inurl:user intitle:index of ext:sql
Web & CMS Secrets
- WordPress Config:
inurl:wp-config.php.save|inurl:wp-config-backup.txt - Environment Secrets:
filetype:env "DB_PASSWORD"|
"MAIL_PASSWORD" filetype:env - Paste Sites:
site:pastebin.com "admin password"|
site:rentry.co intext:"password"
Server Credentials
- Password Files:
intitle:"Index of" htpasswd|intitle:"Index of" pwd.db - Private Keys:
"-----BEGIN RSA PRIVATE KEY-----" ext:key - Database Backups:
inurl:/backup intitle:index of backup intext:*sql
Protocol & Tool Specific
- FTP/FileZilla:
intitle:"index of" "filezilla.xml"|
inurl:"sitemanager.xml" ext:xml - Cloud Storage:
site:*.blob.core.windows.net ext:xls (login | password) - Putty Logs:
filetype:log username putty
Developer & System Hardening Dorks
Dorks specifically looking for misconfigured development environments or source code leaks.
| Target | Dork Example |
|---|---|
| Jenkins | filetype:xml config.xml passwordHash Jenkins |
| Github Leaks | site:github.com inurl:sftp-config.json |
| PostgreSQL | "POSTGRES_PASSWORD=" ext:env |
| Redis | allintext:"redis_password" ext:env |
| Docker/YML | "MYSQL_ROOT_PASSWORD:" ext:yml |
continue:[[]]
before:./port_scans.md