Google Dork Cheatsheet

0
352

Disclaimer
USE AT YOUR OWN RISK! Google Dorking can be used for Cybersecurity, Penetration, and Vulnerability testing. However, some things may lead to illegal activity or concern people's sensitive data.

To protect yourself use a Tor Browser and for even better protection use a VPN.

Documents and Files
filetype:pdf intitle:"Confidental"
filetype:doc intitle:"Confidental"
filetype:xls intitle:"Confidental"
filetype:ppt intitle:"Confidental"

Cameras and Webcams
intitle:"D-Link" inurl:"/video.htm"
intitle:"Linksys Viewer - Login" -inurl:mainFrame
intitle:"Live View /-AXIS"
intitle:"netcam watcher"
intitle:"Network Camera NetworkCamera"
intitle:"TP-LINK IP-Camera"
intitle:"Webcam" inurl:WebCam.htm
intitle:"webcamXP 5"
intitle:webcamxp inurl:8080
inurl:"axis-cgi/mjpg"
inurl:"control/userimage.html"
inurl:"/image/webcam.jpg"
inurl:"/live/cam.html"
inurl:"main.cgi?next_file=main_fs.htm"
inurl:"/mjpg/video.mjpg"
inurl:"MultiCameraFrame?Mode=Motion"
inurl:"/out.jpg"
inurl:"snapshot.cgi?user="
inurl:top.htm inurl:currenttime
inurl:"view/index.shtml"
inurl:"view/indexFrame.shtml"
inurl:"view/viewer_index.shtml"
inurl:"viewerframe?mode=motion"
inurl:"webcam.html"

Control Panels
intitle:"Admin Login"
intitle:"Control Panel" inurl:/admin
intitle:"Control Panel" inurl:/login

Directories
intitle:"Browse Directory"
intitle:index.of
intitle:"index of" database.properties
intitle:"Index of" inurl:/parent-directory
intitle:"Index of" inurl:/admin
intitle:"Index of" inurl:/backup
intitle:"Index of" inurl:/config
intitle:"Index of" inurl:/logs

Email
filetype:txt @gmail.com OR @yahoo.com OR @hotmail.com OR @aol.com
filetype:xls inurl:"email.xls"

 Google Drive
site:drive.google.com confidential

IoT Devices
intitle:"Amazon Echo" "setup"
intitle:"Baby Monitor" inurl:"/live"
intitle:"Doorbell Camera" inurl:"/setup"
intitle:"Google Home" "setup"
intitle:"Router Login" inurl:/login
intitle:"Smart Lighting Control Panel"
intitle:"Sonos - Google Chrome"
intitle:"Thermostat" inurl:"/status"
intitle:"Smart TV" inurl:/cgi-bin/login
intext:"SMART TV" inurl:password.txt
inurl:"description.xml" "Philips hue bridge"
inurl:"/smartlock" intitle:"Login"
Login
intitle:login
intitle:login inurl:/admin
intitle:login inurl:/login
inurl:login
inurl:"/admin/login.php"
site:preprod.* * inurl:login

Movies
intitle:"index.of" (mp4|avi|mkv) "[movie name]" -html -htm -php -asp -jsp
[movie name] site:drive.google.com intitle:wmv|mpg|avi|mp4|mkv|mov
inurl:mkv+[movie name]
inurl:mp4+[movie name]

Network Devices
intext:"printer meter"
intitle:”Brother” intext:”View Configuration”
intitle:"Device name" inurl:home.htm
intitle:”Network Print Server” filetype:html
intitle:”HP LaserJet” inurl:SSI/index.htm
intitle:"open network devices"

WordPress
intext:”Powered by WordPress”
intitle:”Login — WordPress”
intitle:"powered by WordPress" version
inurl:wp-content/plugins/
inurl:/wp-content/plugins/revslider/

Rechercher
Catégories
Lire la suite
Tech
Top 10 Ethical Hacking Tools (2026 Edition)
A curated list of powerful, widely used tools for penetration testing, red teaming, and...
Par techhub 2026-02-27 13:15:44 0 457
Tech
Zero Trust Architecture: Essential Cloud Security for 2026
Why Zero Trust is Critical in 2026 Traditional perimeter-based security models have become...
Par techhub 2026-02-27 13:15:48 0 730
Tech
New “Massiv” Android Banking Malware Spreads Through Fake IPTV Apps
Security researchers have identified a newly emerging Android banking trojan known as Massiv,...
Par techhub 2026-02-27 13:15:41 0 316
Tech
Under Armour Investigates Major Data Breach Affecting Millions of Customers
Clothing and athletic gear company Under Armour is investigating a significant data breach that...
Par techhub 2026-02-27 13:15:46 0 605
Tech
Microsoft Patches Actively Exploited Office Vulnerability — Update Immediately
Microsoft has released an urgent security update for a critical vulnerability affecting...
Par techhub 2026-02-27 13:15:47 0 769