Updated Google Dorks List and Password Files Database in 2022 - Box Piper (2023)

11 minutes of reading
Last updated: December 23, 2022

Updated Google Dorks List and Password Files Database in 2022 - Box Piper (1)

How do I use Google Dorks?

To use google idiot, just type google idiot into the google search box and press “Enter”. Here are some of the best Google Dork queries that you can use to search Google for information.

Examples of Google Dork queries:

  • site:.edu "Phone number"- This idiot looks for sites on .edu domains that contain the words "phone number". Student "phone number" - This idiot looks for sites on .edu domains that contain the words "student" and "phone number".
  • inurl:edu "Login"- This idiot looks for sites on .edu domains that contain the word "login". This idiot looks for school websites that contain student credentials.
  • „powered by vbulletin“-Site:.edu- This idiot looks for sites on .edu domains that contain the words "powered by vbulletin". This idiot is looking for school sites that run on vbulletin forum software.
  • „powered by vbulletin“-Site: .gov- This idiot looks for sites on .gov domains that contain the words "powered by vbulletin". This idiot looks for government websites that run on vbulletin forum software.
  • „powered by vbulletin“-Site: .mil- This idiot looks for sites on .mil domains that contain the words "powered by vbulletin". This idiot searches for military sites that run on vbulletin forum software.
  • "powered by vbulletin" inurl:.edu- This idiot looks for sites on .edu domains that contain the words "powered by vbulletin". This idiot is looking for school sites that run on vbulletin forum software.
  • "supported by vbulletin" inurl:.mil- This idiot looks for sites on .mil domains that contain the words "powered by vbulletin". This idiot searches for military sites that run on vbulletin forum software.
  • inurl:.com "powered by vbulletin"- This idiot looks for sites on .com domains that contain the words "powered by vbulletin". This idiot looks for sites that run on vbulletin forum software.
  • inurl:.edu "Registrar forum"- This idiot looks for sites on .edu domains that contain the words "registration forum". This idiot is looking for school websites where you can sign up for a forum.
  • inurl:.gov "Register forum"- This idiot looks for sites on .gov domains that contain the words "registration forum". This idiot is looking for government websites where you can sign up for a forum.

Scraper-APIprovides a proxy service designed for web scraping. With over 20 million private IP addresses in 12 countries and software capable of rendering JavaScript and solving CAPTCHAs, it can handle large scraping jobs quickly without worrying about any server being blocked.

Updated Google Dorks database for files with passwords:

 "cpanel username" "cpanel password" extension:TXT"Insert to user" "VALUES" extension:SQL |extension:text |extension:enter |extension:environment"password 7" extension:text |extension:enter |extension:cfgtitle:"index of" "idx_config""mail_password:"+"mailer_host:"+"mailer_user:"+"Secret:" extension:ymli am text:build('mysql:host"keystorePass=" extension:xml |extension:txt-git-gitlab"definir('SECURE_AUTH_KEY'"+"definir('LOGGED_IN_KEY'"+"definir('NONCE_KEY'" extension:text |extension:cfg |extension:env |extension:Hetitle:"index of" "anaconda-ks.cfg"|"anaconda-ks-new.cfg""definir('DB_USER',"+"definir('DB_PASSWORD'," extension:TXTtitle:"index of" "config.exs"|"dev.exs"|"test.exs"|"prod.secret.exs"jdbc:oracle://installation host:+ username + passwordextension:yml |extension:Java-git-gitlabjdbc:postgresql://installation host:+ username + passwordextension:yml |extension:Java-git-gitlabjdbc:mysql://installation host:3306/ + username + passwordextension:yml |extension:javascript-git-gitlab"spring.datasource.password="+"spring.datasource.username=" extension:-git properties -gitlabextension:END_FILE protocol passwordProperty:pastebin.comi am text:admin password"db.username"+"db.password" extension:Characteristicsextension:cfg"g_password"|"sv_private password"|"RCON password"-git-gitlab"servidor.cfg" extension:cfgi am text:"RCON password"-git-gitlab"anaconda-ks.cfg"|"ks.cfg" extension:cfg -git -gitlabrootpw --iscryptedextension:cfg"Administrator Password" extension:text |extension:enter |extension:cfg"index of" "password.ini"File type:Protocoli am text:passwordafter:2015i am text:@gmail.com |@yahoo.com |@hotmail.com"'user name'=>" + "'Password'=>"extension:Protocolextension:TXTi am text:@yahoo.comi am text:passwordtitle:"Database.php" inurl:"Database.php" i am text:"db_password"-git-gitlabextension:XLSi am text:@googlemail.comi am text:password"POSTGRES_PASSWORD=" extension:text |extension:cfg |extension:env |extension:die |extension:yml |extension:sql-git-gitlab"/** MySQL database password */" extension:text |extension:cfg |extension:env |extension:He"EMAIL_HOST_PASSWORD" extension:yml |extension:env |extension:text |extension:Protocolallentext:"redis_password" extension:environmenti am text:"database_db" extension:environmenti am text:"db_password""index of" "/yahoo_site_admin/credentials"allentext:passwordFile type:Protocolinurl:recordsi am text:TO RECEIVEhttps://extension:TXTi am text:passwordi am text:user nametitle:"index of" "/maestro.contraseña""MYSQL_ROOT_PASSWORD:" extension:approx. Oextension:yml-gitFile type:environment"DB_PASSWORD""index of" ".env"i am text:"/password index""config.php.bak" title:"index of"title:"index of" "neon setting"O"config.local.neon"title:"index of" "Passwords.xlsx"inurl:*Advice Center*i am text:"Your default password is""Master User Password" extension:cfg Oextension:register ORextension:txt-git"/etc/root oculto:$" extension:cfg Oextension:register ORextension:txt ODERextension:SQL-gittitle:"index of" "*.passwords.txt""irreversible-chiffre admin password" extension:txt ODERextension:register ORextension:cfg"Super Password Level 3 Encryption" extension:txt ODERextension:Protocoltitle:"index of" "db.ini"title:"index of" "database.ini"O"database.ini.old"title:"index of"Anwendung. inititle:"index of" "db.connection.js""d-i passwd/root-password-encrypted password" extension:cfg"Configure Encrypted User Account" extension:cfg"Create an account"Administratorextension:cfgpassword Console passwordextension:cfg-git"Enable Password" extension:cfg-git-cisco.comtitle:"index of"dbconnect.inci am text:Set Authentication Encrypted Passwordextension:cfgtitle:"index of" "Passwords.yml"title:"index of" "credentials.yml"i am text:"WPENGINE_SESSION_DB_USERNAME"||"WPENGINE_SESSION_DB_PASSWORD"i am text:"username="Y"password=" extension:Protocoltitle:index of"creds.txt"title:"index of"share.passwd ODER cloud.passwd ODER ftp.passwd -publictitle:"index of" "db.conf"title:"index of"password.txt"Password" File type:sql-github.comi am text:"@googlemail.com" i am text:"Password" inurl:/files/extension:TXTtitle:"index of" "ftp.password"title:"index of" "htcontraseña.txt""to happen" "From user" File type:sqli am text:"aspx" File type:txt record and amplifier;passwordinurl:users.json +"user name"i am text:"wordpress" File type:xls record and amplifier;passwords3Property:amazonaws.comFile type:password xlsinurl:login.txtFile type:TXTinurl:wp-config.phpi am text:DB_CONTRASEÑA -stackoverflow -wpbeginnertitle:configuration.pyi am text:EMAIL_USE_TLS -git -stackoverflowtitle:configuration.pyi am text:EMAIL_HOST_PASSWORD -git -stackoverflow username | passwordinurl:resources/application.properties -github.com -gitlabFile type:xml config.xml contraseñaHash Jenkinsi am text:jdbc:oracleFile type:JavaFile type:txt $9$ Jun OSFile type:HKEY_CURRENT_USER registry registryi am text:passwordinurl:"independent.xml" i am text:"password>"/_wpeprivate/config.jsoninurl:"build.xml" i am text:"tomcat.manager.password"title:"index of" i am text:login.csvinurl:"trello.com"Yi am text:"user name"Yi am text:"Password"inurl:"wp-license.php?file=../..//wp-config""battle field" "E-mail" Property:pastebin.cominurl:wp-config.baki am text:"rabbit_password"|"service_password" File type:Conference"Oops! An error occurred." "db_password"i am text:"Record"Department | Administrator | Managers | Company | hostFile type:XLS | xlsx-community-githubi am text:"Please change yours"password | code | Recordfile:pdf | Document | text | docx-githubinurl:configuration.php andi am text:"var $password="inurl:/dbcp.propiedades +File type:Properties -github.comi am text:define('AUTHENTICATION KEY',' wp-config.phpFile type:TXTinurl:wp-config-backup.txt"Password.xlsx" extension:XLSXFile type:environmenti am text:REDIS_PASSWORDtitle:"index of" inurl:"CV"enter | password | password | Access | pass-github-pubProperty:showmyhomework.co.uk/school/homeworks/"Password"File type:Whileinurl:"Government" i am text:"The default password is"Property:trello.comi am text:mysqli am text:password-Property:entwickler.trello.com-Property:ayuda.trello.comi am text:"Protocolo PuTTY" extension:Protocol"Password"-Support for -githubinurl:"/Aplication.Config"+extension:settings +"password="-github-gittitle:"index of" i am text:"Access data"inurl:"servlet/ViewFormServlet?" "pwd"co-firedFile type:sqli am text:Password | People with disabilitiesi am text:Username | Your namei am text:Paste user valuestitle:"index of" "lugares.sqlite" "Mail"Thunderbird-mozilla.org-escanearextension:this is robust.iniFile type:He"Password"File type:Context"" "Password" "web.config"-stackoverflow -youtube.com -githubtitle:"index of" "lugares.sqlite" "clave3.db"-mozilla.orginurl:"config.xml" "Password" extension:xml-stackoverflow.com-github.com
(Video) Find Vulnerable Services & Hidden Info Using Google Dorks [Tutorial]

A Google Dork is a search query that looks for specific information on Google's search engine. Google Idiots are developed and published by hackers and are often used in "Google hack".

Google idiots are extremely powerful. They allow you to search a wide range of information on the internet and can be used to find information you didn't even know existed.

Due to the power of Google Dorks, hackers often use them to find information about their victims or to find information that can be used to exploit vulnerabilities in websites and web applications.

Google's search engine is designed to crawl everything on the web, and that helps us find images, text, videos, news, and a host of other sources of information. With its tremendous tracking capabilities, it indexes real-time data that also contains sensitive information like email addresses, login credentials, sensitive files, website vulnerabilities and even financial information. In so many cases,Ussince a user is not even aware of it.

google idiotis a search query that we send to Google to find more detailed information and quickly retrieve relevant information. For example, try searching for your name and check the results with a search query [inurl:your-name]. Analyze the difference. You just told Google to do a deeper search, and it did it beautifully.

  • cache:

    (Video) Google HACKING (use google search to HACK!)

    • [cache:www.google.com web] displays cached content with the word "web" highlighted. This feature can also be accessed by clicking on the "Cached" link on the main Google results page. The query [cache:] returns the version of the web page that Google has in its cache. For example, [cache:www.google.com] returns Google's cache of the Google home page.
  • shortcut:

    • [link:www.google.com] lists sites that have links pointing to the Google homepage.
  • related:

    • [related:www.google.com] lists web pages similar to Google's home page.
  • data information:

    • [info:www.google.com] displays information about the Google homepage.
  • define:

    • The query [define:] returns a definition of the words you type below, taken from various online sources. The setting applies to the entire sentence you typed (that is, it includes all words in the exact order you typed them). Example: [set: google]
  • to share:

    • When you initiate a query with the [stocks:] operator, Google treats the rest of the query terms as stock quotes and links to a stock information page for those quotes. For example, [stocks:intc yhoo] displays information about Intel and Yahoo. (Note that you must enter the ticker symbols, not the company name.)
  • Property:

    (Video) Master the Art of Google Hacking: How to Find Anything on the Internet Using Google Dorks

    • If you include [site:] in your query, Google will limit results to those sites in the specified domain. For example, [help page:www.google.com] finds help pages at www.google.com. [helppage:com] finds help pages at the .com URL. Note that there cannot be a space between "site:" and the domain.
  • all in the title:

    • If you start a search with [allintitle:], Google will limit results to those with all of your search terms in the title. For example, [allintitle: google search] will only return documents that contain "google" and "search" in the title.
  • title:

    • If you include [intitle:] in your search query, Google will limit results to documents that contain that word in the title. For example, [intitle:google search] returns documents that contain the word "google" in the title and the word "search" anywhere in the document (titled or untitled). Putting [intitle:] before each word in your query is equivalent to putting [allintitle:] before your query: [intitle:google intitle:search] is the same as [allintitle: google search].
  • allinurl:

    • If you start a search with [allinurl:], Google will limit results to those with all the search words in the URL. For example, [allinurl:google search] will only return documents that contain "google" and "search" in the URL. Note that [allinurl:] works on words, not URL components. Specifically, it ignores punctuation. Thus, [allinurl:foo/bar] restricts results to pages with the words "foo" and "bar" in the URL, but does not require that they be separated by a slash within that URL, be adjacent, or be located in that particular order of words. There is currently no way to enforce these restrictions.
  • inurl:

    • If you include [inurl:] in your search query, Google will limit results to documents that contain that word in the URL. For example, [inurl:google search] returns documents that mention the word "google" in their URL and mention the word "search" somewhere in the document (URL or not). Putting "inurl:" before each word in your query is equivalent to putting "allinurl:" before your query: [inurl:google inurl:search] is the same as [allinurl:google search].

The Google search service never intends to gain unauthorized access to the data, but nothing can be done if we ourselves keep the data open and do not follow proper security mechanisms.

Essentially, emails, usernames, passwords, financial records, etc. they must not be available to the public unless intended. For example, it is expected that our bank details will never be available on a Google search. But the details of our social networks are public because we allow it ourselves.

(Video) How to HACK 455 MILLION Websites | WordPress Hacking

Final note

Google search is very useful and at the same time equally harmful. Because it indexes everything available on the web.

You must follow appropriate security mechanisms and prevent systems from revealing sensitive data. ContinueOWASP, provides a standard awareness document for developers and web application security.

Scraper-APIprovides a proxy service designed for web scraping. With over 20 million private IP addresses in 12 countries and software capable of rendering JavaScript and solving CAPTCHAs, it can handle large scraping jobs quickly without worrying about any server being blocked.

Updated Google Dorks List and Password Files Database in 2022 - Box Piper (2)

Note: Box Piper does not support hacking under any circumstances. This article was written to provide only relevant information. Always comply with data protection and security.

Videos

1. Spamming Tutorial: How To Spam Bank Logs and Credit Card Information [Educational Only]
(Smart Lazy Hustler)
2. View Smartphone Traffic with Wireshark on the Same Network [Tutorial]
(Null Byte)
3. Find Network Vulnerabilities with Nmap Scripts [Tutorial]
(Null Byte)
4. Hunt Down Social Media Accounts by Usernames Using Sherlock [Tutorial]
(Null Byte)
5. Security: Fingerpainting
(#misec)
6. Ransomware Dark Web Leak Sites Exposed
(Xact Cybersecurity)
Top Articles
Latest Posts
Article information

Author: Moshe Kshlerin

Last Updated: 03/24/2023

Views: 5741

Rating: 4.7 / 5 (77 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Moshe Kshlerin

Birthday: 1994-01-25

Address: Suite 609 315 Lupita Unions, Ronnieburgh, MI 62697

Phone: +2424755286529

Job: District Education Designer

Hobby: Yoga, Gunsmithing, Singing, 3D printing, Nordic skating, Soapmaking, Juggling

Introduction: My name is Moshe Kshlerin, I am a gleaming, attractive, outstanding, pleasant, delightful, outstanding, famous person who loves writing and wants to share my knowledge and understanding with you.