• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

5 Google Dorks Every Hacker Should Know. (1 Viewer)

Currently reading:
 5 Google Dorks Every Hacker Should Know. (1 Viewer)

Recently searched:

Dex90

Member
LV
1
Joined
May 6, 2023
Threads
12
Likes
11
Awards
4
Credits
1,064©
Cash
0$
Start with “site:<domain>”. Then, exclude boring pages with “-www” or other terms until you get to the juicy stuff:
Code:
site:tesla.com -www -shop -share -ir -mfa

Pastebin Leaks.​

Check out sites like pastebin, jsfiddle, and codebeautify for code left over from developers:
Bash:
site:pastebin.com
site:jsfiddle.net
site:codebeautify.org
site:codepen.io "tesla.com"

PHP extension w/ parameters.​

Use “ext:php” and “inurl:?” along with the domain to find .php files with a question mark in the url:
Bash:
site:tesla.com ext:php inurl:?


Disclosed XSS and Open Redirect Bug Bounties.​


Look through both fixed and unfixed bug bounties publicly disclosed through OpenBugBounty:

Bash:
site:openbugbounty.org inurl:reports intext:"yahoo.com"

Combine your dorks.​


Use the “|” operator to include both queries or the “&” operator to require both queries. Here’s an example of attempting to search for file upload endpoints across multiple domains:

Bash:
(site:tesla.com | site:teslamotors.com) & ”choose file”
 
  • Like
Reactions: fognayerku

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom