Google Dorks Cheat Sheet
Google Dorks Cheat Sheet
A “Google dork” is an advanced Google search technique. “Google dorking” (aka “Google
hacking”) is the activity of performing advanced searches on Google. You can combine
different Google dorks to comb data otherwise inaccessible to ordinary users of Google
search.
On a browser, if you make too many Google searches in a short time, Google requires that
you unscramble garbled letters in an image called a captcha before you can proceed.
Captcha completion can frustrate end users like you, but Google servers must nip
denial-of-service cyberattacks in the bud.
Unlike most cheat sheets, we cannot guarantee that the commands below will remain
unchanged in perpetuity. Google updates its dorks continually, so deprecated techniques
don’t appear here, even if you can find them elsewhere on the Internet.
No, you’re not immune even if you’re working from a virtual machine toying with sqlmap.
If you know you can’t resist having fun with it (and you will), you could work from Pagodo,
which automates Google searching for potentially vulnerable web pages and applications on
the Internet. It also lets you automate the rate at which your device issues Google dorks.
Regardless of how you use Google dorks, respect Google’s Terms of Service. Be careful.
Examples of Creepy Dorks
These dorks reveal vulnerabilities in websites, and their contents may be newsworthy
depending on the zeitgeist.
For details on how the following commands work, refer to Text dorks, Google Dorks
Operators, and Scope-Restricting Dorks.
Examples Description
”index of” inurl:ftp secret Get FTP servers you want to access
containing the keyword “secret”
Critical dorks performed on .env files Popular web development frameworks use
yielding results such as: .env files to declare general variables and
configurations for local and online dev
environments, often including passwords.
This often-updated exploit database contains other Google dorks that expose sensitive
information. Proceed with caution.
For example, in the search site:stationx.net, the domain “stationx.net” is the parameter. In
(psychology OR computer science) AND design, the three subjects of psychology, computer
science, and design are the parameters. In 16 F to C (converting a temperature from
degrees Fahrenheit to Celsius), 16 is the parameter.
Search parameters include web domains, file extensions, numbers, and character strings
with or without quotes.
Scope-Restricting Dorks
These help specify your target range of websites or data types. For example, in hunting for
e-books, the Google dork “filetype:pdf” is indispensable.
If a command listed below ends with a symbol, include no space between the command and
the parameter. The correct way to use each command is in the “Example usage” column.
Otherwise, Google will treat the command as an ordinary search keyword rather than a dork.
Nonetheless, searches on
mp3 and mp4 with and
without additional search
terms have yielded no
results.
Informational Dorks
These dorks appear to work best if used as standalone commands, i.e., without additional
query items.
Results may be
inconsistent.
intitle:, allintitle: Look for pages with titles intitle:toy story, intitle:"toy
containing the search terms. story", allintitle:"toy story",
allintitle:toy story
The dork “intitle:” applies to
its search parameter only, Compare the above with the
while “allintitle:” applies to number of search results of
the entire query string. toy story and "toy story".
Search
These refine the search and constrain the results to follow the rules of logic. Most of the
following are logical operators.
Note that these are straight and not curly “” Compare 'movie review' and
quotation marks. The curly quotes may or "movie review":
may not return similar results as straight
quotes.
OR, | Return sites containing either query item Amazon OR Google yields
joined by OR or the pipe character |. the same number of results
as Amazon | Google.
This is an inclusive OR.
#..# Search a numerical range specified by the 2006..2008 finds all pages
two endpoints # inclusive that include 2006, 2007, or
2008 in them.
AROUND(N) Match pages containing the search terms read AROUND(2) book,
separated by at most N other words read AROUND(3) book
AND, &, + Concatenation; return sites containing both Amazon AND Google,
query items joined by AND, the ampersand Amazon & Google, Amazon
symbol & or the plus sign +. + Google.
Math
The following are mathematical operations that you can perform on Google.
Operators Description Example usage Result
+ Addition 3 + 20 23
- Subtraction 3 - 20 -17
* Multiplication 3 * 20 60
/ Division 3 / 20 0.15
(Combinatorics)
sin, cos, tan Trigonometric functions. You sin(pi/6), sin 30 sin(pi/6) = 0.5, sin
may specify the formula using degrees 30 degrees = 0.5
symbols and natural
language.
timer Timer timer for 20 minutes
Google also supports other scientific calculator operations on its calculator. This website
features additional examples of mathematical operations you can perform on Google.
Command Description
@reddit memes -dark Find memes on Reddit that are not dark
filetype:doc site:stationx.net nathan StationX with the .doc extension. This looks
for legacy Microsoft Word files containing
the keyword “nathan” (founder’s name).
A Word of Caution
Other websites mentioning Google Dorks typically recommend using robots.txt to
conceal sensitive content or to stop Google from indexing specific parts of your website. On
your website server, you can find robots.txt in the root-level directory, such as
/public_html.
What seems like a simple, good-faith solution to eliminate complex reconnaissance via
Google Dorks is, to an intelligent hacker, a treasure trove and a cash cow. Instead of backing
off, they’ll attack your website by targeting the items listed in robots.txt.
Hence, it’s best to adopt this measure cautiously. The most prudent use of robots.txt is
instructing Google to exclude one’s entire website, as follows:
User-agent: *
Disallow: /
Such a robots.txt file compels visitors looking for information to use the search function
inside the website. A well-built internal search function may have safeguards against Google
dorking, SQL injection, and other hacking techniques. These safeguards protect the website
better than allowing external search engines such as Google to index the website.
Conclusion
Ethical and legal considerations abound when using Google dorks. They are such powerful
tools for uncovering data and locating vulnerabilities that your intention and frequency in
using them are paramount to your Google dorking experience. Google dorking is an
invaluable tool for practical cyber security research when used responsibly.
We hope this cheat sheet is helpful to you as a penetration tester, ethical hacker, or
someone interested in the security position of your enterprise. You can read our full guide on
Google dorking specific websites here.
Remember: with great power comes great responsibility. More important than enjoying
Google dorking, stay safe.