Google Hacking Dorks
Advanced Google search operators for security research & reconnaissance
⚠️ Educational Purpose Only — These techniques are for authorized security testing and research only. Never use against systems you don't have permission to test.
Target Domain (Optional)
Leave blank to see generic dorks. Enter a domain to prepend site: operator automatically.
Create Custom Dork
Build your own Google search query using operators from the cheat sheet below.
Google Dork Operators Cheat Sheet
| Operator | Syntax | Example | Purpose |
|---|---|---|---|
| site: | site:example.com | site:github.com password | Search within a specific domain |
| filetype: | filetype:pdf | filetype:sql database | Find specific file types |
| inurl: | inurl:admin | inurl:wp-admin | Search in URL path |
| intitle: | intitle:"admin panel" | intitle:"index of" | Search in page title |
| intext: | intext:password | intext:"sql syntax error" | Search in page body text |
| ext: | ext:conf | ext:xml inurl:config | Search file extensions |
| cache: | cache:example.com | cache:github.com | View cached version |
| related: | related:example.com | related:google.com | Find related websites |
| info: | info:example.com | info:github.com | Get site information |
| define: | define:term | define:vulnerability | Get definitions |