#1
[THREAD] Top 35 Google Dorks for Hacking and Info Gathering ?
1️⃣ Exposed Directories:
 
Code:
intitle:"Index of" -inurl:(jsp|pl|php|html|aspx|htm|cf|shtml) -inurl:(listen77|mp3raid|mp3toss|mp3drug|index_of|wallywashis)
2️⃣ Open Webcams:
 
Code:
inurl:"viewerframe?mode=motion"
3️⃣ Email Lists:
 
Code:
filetype:txt @gmail.com OR @yahoo.com OR @hotmail.com OR @aol.com
4️⃣ Vulnerable Web Servers:
 
Code:
intitle:"Welcome to Windows 2000 Internet Services"
5️⃣ Exposed CCTV Cameras:
 
Code:
inurl:ViewerFrame?Mode=Motion
6️⃣ SQL Injection Vulnerabilities:
 
Code:
inurl:index.php?id=
7️⃣ Sensitive Files:
 
Code:
intitle:"Index of" password.txt
8️⃣ Login Pages:
 
Code:
inurl:admin/login
9️⃣ Exposed Databases:
 
Code:
intext:"phpMyAdmin" "running on" inurl:"main.php"
? Vulnerable WordPress Sites:
 
Code:
inurl:/wp-content/plugins/revslider/
(1/3) ?
(2/3) ?
1️⃣1️⃣ Open FTP Servers:
 
Code:
intitle:"index of" inurl:ftp
1️⃣2️⃣ Exposed Config Files:
 
Code:
intitle:"index of" config.yml
1️⃣3️⃣ Open Git Repositories:
 
Code:
intitle:index of .git
1️⃣4️⃣ Vulnerable Joomla Installations:
 
Code:
inurl:/index.php?option=com_joomla
1️⃣5️⃣ Sensitive Files:
 
Code:
intitle:"index of" password OR passcode OR passphrase OR keyfile
1️⃣6️⃣ Exposed MongoDB Instances:
 
Code:
intitle:"mongodb status" intext:"topologyVersion"
1️⃣7️⃣ Open Network Devices:
 
Code:
intitle:"open network devices"
1️⃣8️⃣ Exposed Subdomains:
 
Code:
site:*.example.com -www
1️⃣9️⃣ Vulnerable Apache Tomcat:
 
Code:
intitle:"Apache Tomcat" intext:"If you're seeing this, you've successfully installed Tomcat"
2️⃣0️⃣ Exposed GitLab Repos:
 
Code:
intitle:"GitLab"
2️⃣1️⃣ Server Directories:
 
Code:
intitle:"index of" /admin
2️⃣2️⃣ Sensitive Google Drive Files:
 
Code:
site:drive.google.com confidential
2️⃣3️⃣ Exposed Jenkins Instances:
 
Code:
intitle:"Dashboard [Jenkins]"
2️⃣4️⃣ AWS S3 Buckets:
 
Code:
site:s3.amazonaws.com
2️⃣5️⃣ Vulnerable Magento Installations:
 
Code:
inurl:/index.php/admin
Keep scrolling for more!?
(2/3) ?
(3/3) ?
2️⃣6️⃣ Exposed Log Files:
 
Code:
intitle:"index of" error.log
2️⃣7️⃣ Open Elasticsearch Instances:
 
Code:
intitle:"Kibana" intext:"Welcome to Elastic"
2️⃣8️⃣ Exposed API Keys:
 
Code:
filetype:env intext:API_KEY
2️⃣9️⃣ phpMyAdmin Installations:
 
Code:
inurl:"phpmyadmin/index.php"
3️⃣0️⃣ Vulnerable OpenCart Installations:
 
Code:
inurl:/admin/config.php
3️⃣1️⃣ Sensitive Documents:
 
Code:
filetype:pdf "Confidential"
3️⃣2️⃣ Exposed Network Devices:
 
Code:
intitle:"Device name" inurl:home.htm
3️⃣3️⃣ Open RDP Servers:
 
Code:
intitle:"Remote Desktop Web Connection"
3️⃣4️⃣ Exposed Firebase Databases:
 
Code:
intitle:"Firebase Console - Projects"
3️⃣5️⃣ Vulnerable Drupal Installations:
 
Code:
inurl:"/user/login" "Powered by Drupal"
Disclaimer: ⚠️ Always use this knowledge responsibly and within the boundaries of the law. Misuse can lead to serious consequences.
Share and bookmark this for research! ?️