5 Google Dorks Every Hacker Should Know. | General Hacking | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

5 Google Dorks Every Hacker Should Know.

5 Google Dorks Every Hacker Should Know.

LV
1
 

Dex90

Member
Joined
May 6, 2023
Threads
12
Likes
11
Awards
4
Credits
1,064©
Cash
0$
Start with “site:<domain>”. Then, exclude boring pages with “-www” or other terms until you get to the juicy stuff:
Code:
site:tesla.com -www -shop -share -ir -mfa

Pastebin Leaks.​

Check out sites like pastebin, jsfiddle, and codebeautify for code left over from developers:
Bash:
site:pastebin.com
site:jsfiddle.net
site:codebeautify.org
site:codepen.io "tesla.com"

PHP extension w/ parameters.​

Use “ext:php” and “inurl:?” along with the domain to find .php files with a question mark in the url:
Bash:
site:tesla.com ext:php inurl:?


Disclosed XSS and Open Redirect Bug Bounties.​


Look through both fixed and unfixed bug bounties publicly disclosed through OpenBugBounty:

Bash:
site:openbugbounty.org inurl:reports intext:"yahoo.com"

Combine your dorks.​


Use the “|” operator to include both queries or the “&” operator to require both queries. Here’s an example of attempting to search for file upload endpoints across multiple domains:

Bash:
(site:tesla.com | site:teslamotors.com) & ”choose file”
 
  • Like
Reactions: fognayerku

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Similar threads

Top Bottom