http://www.exploit-db.com/google-dorks/
Welcome to the google hacking database
We call them 'googledorks': Inept or foolish people as revealed by Google. Whatever you call these fools, you've found the center of the Google Hacking Universe!
Search Google Dorks
Latest Google Hacking Entries
Date | Title | Category |
---|---|---|
2014-11-19 | Pages containing login portals | |
2014-11-18 | Files containing juicy info | |
2014-11-17 | Files containing juicy info | |
2014-11-03 | Vulnerable Servers | |
2014-11-03 | Vulnerable Servers | |
2014-10-21 | Files containing juicy info | |
2014-10-15 | Various Online Devices | |
2014-10-14 | Pages containing login portals | |
2014-10-09 | Files containing juicy info | |
2014-10-09 | Files containing juicy info |
Google Hacking Database Categories
Files containing usernames
(17)
These files contain usernames, but no passwords... Still, google finding usernames on a web site..
These files contain usernames, but no passwords... Still, google finding usernames on a web site..
Sensitive Directories
(74)
Google's collection of web sites sharing sensitive directories. The files contained in here will vary from sesitive to uber-secret!
Google's collection of web sites sharing sensitive directories. The files contained in here will vary from sesitive to uber-secret!
Vulnerable Servers
(80)
These searches reveal servers with specific vulnerabilities. These are found in a different way than the searches found in the "Vulnerable Files" section.
These searches reveal servers with specific vulnerabilities. These are found in a different way than the searches found in the "Vulnerable Files" section.
Sensitive Online Shopping Info
(10)
Examples of queries that can reveal online shopping info like customer data, suppliers, orders, creditcard numbers, credit card info, etc
Examples of queries that can reveal online shopping info like customer data, suppliers, orders, creditcard numbers, credit card info, etc
Network or vulnerability data
(63)
These pages contain such things as firewall logs, honeypot logs, network information, IDS logs... all sorts of fun stuff!
These pages contain such things as firewall logs, honeypot logs, network information, IDS logs... all sorts of fun stuff!
Pages containing login portals
(289)
These are login pages for various services. Consider them the front door of a website's more sensitive functions.
These are login pages for various services. Consider them the front door of a website's more sensitive functions.
Various Online Devices
(244)
This category contains things like printers, video cameras, and all sorts of cool things found on the web with Google.
This category contains things like printers, video cameras, and all sorts of cool things found on the web with Google.
Advisories and Vulnerabilities
(1971)
These searches locate vulnerable servers. These searches are often generated from various security advisory posts, and in many cases are product or version-specific.
These searches locate vulnerable servers. These searches are often generated from various security advisory posts, and in many cases are product or version-specific.
Watch 100s of full Japanese Adult Videos streaming at JAVRedlight.com no signup or credit card required. Just what you want on demand.
ReplyDeleteshowtimes
Excellent website! I adore how it is easy on my eyes it is. I am questioning how I might be notified whenever a new post has been made. Looking for more new updates. Have a great day! Crypto News
ReplyDelete