What this section does
Browse the dork library by keyword, category, and risk level, then move the useful queries into your workspace instead of losing them after one click.
Authorized search-engine reconnaissance
Phase 2 turns Dork Explorer into a stronger recon workbench with richer query briefings, a more flexible builder, and a reporting studio that converts saved checks into a client-ready review snapshot.
Browse the dork library by keyword, category, and risk level, then move the useful queries into your workspace instead of losing them after one click.
Choose an engine, optionally add your target domain, and then launch, copy, or save dorks. Domain scoping prepends site:yourdomain.com to the visible query.
Visitors get reusable search patterns, attack context, defensive guidance, workspace saving, and a smoother path into exposure reviews, document hunts, secret discovery, and portal checks.
Backups & Archives
intitle:"index of" backup
Backup directories often contain full copies of sensitive systems.
An attacker downloads historical backups for offline analysis.
Disable directory listing and secure backup locations.
Secrets & Tokens
"SMTP_PASSWORD" | "MAIL_PASSWORD"
Email credentials can be abused for phishing or spam campaigns.
An attacker uses leaked SMTP credentials to send malicious emails.
Rotate mail credentials and secure configuration files.
Network Security
filetype:ovpn
VPN configuration files may enable unauthorized network access.
An attacker imports VPN configs to attempt network connections.
Protect VPN configs and revoke exposed credentials.
Source Code Management
filetype:gitignore
.gitignore files reveal ignored files and project structure.
An attacker uses ignored paths to infer sensitive files.
Avoid exposing repository metadata publicly.
Cloud & Containers
intitle:"Kubernetes Dashboard"
Kubernetes dashboards allow full cluster visibility and control.
An attacker gains access to workloads and secrets via the dashboard.
Disable public dashboards and enforce RBAC and authentication.
Monitoring & Observability
inurl:metrics | inurl:prometheus
Monitoring endpoints may expose system metrics and internal architecture.
An attacker analyzes metrics to understand system capacity and weak points.
Protect monitoring endpoints with authentication and network controls.
DevOps
filetype:yml ".gitlab-ci" | filetype:yaml "pipeline"
CI/CD configs reveal build steps, secrets usage, and deployment logic.
An attacker abuses CI/CD knowledge to target build pipelines.
Restrict access to CI/CD configuration files and audit pipelines.
Secrets & Tokens
"username" "password" filetype:js
Hardcoded credentials enable direct system compromise.
An attacker extracts credentials from client-side or server-side code.
Remove credentials from code and use secure secret management.
Cloud Misconfiguration
filetype:yml | filetype:yaml "aws"
Cloud configuration files may contain infrastructure details or credentials.
An attacker uses exposed configs to map or access cloud resources.
Keep infrastructure-as-code files private and rotate exposed secrets.
APIs
inurl:swagger | inurl:api-docs | inurl:openapi
Public API documentation may expose endpoints, parameters, and internal logic.
An attacker studies API documentation to craft targeted requests.
Restrict API documentation to authenticated users and non-production environments.
DevOps
intitle:"Grafana"
Grafana exposure reveals metrics and systems.
An attacker monitors infrastructure.
Secure dashboards behind authentication.
DevOps
intitle:"Kibana"
Kibana may expose logs and sensitive data.
An attacker views sensitive logs.
Restrict Kibana access.
DevOps
intitle:"Dashboard [Jenkins]"
Jenkins exposure allows CI/CD compromise.
An attacker abuses Jenkins pipelines.
Secure Jenkins with auth and network controls.
Databases
inurl:phpmyadmin
Database management panels allow direct DB access.
An attacker targets exposed DB admin panels.
Restrict access and enforce authentication.
Documents
filetype:pdf | filetype:docx | filetype:xlsx
Documents may contain sensitive internal data.
An attacker downloads internal documents.
Restrict document access and sanitize content.
Reconnaissance
filetype:txt robots
Robots.txt may reveal sensitive paths.
An attacker inspects disallowed paths.
Avoid listing sensitive directories.
Staging, Dev & Test Environments
inurl:staging | inurl:test
Staging environments often lack proper security.
An attacker targets weaker non-prod systems.
Secure non-production environments.
Staging, Dev & Test Environments
inurl:/debug intitle:"Debug"
Debug pages expose stack traces and internals.
An attacker uses debug output to understand the app.
Disable debug endpoints in production.
Source Code
filetype:php | filetype:js
Source code reveals business logic and vulnerabilities.
An attacker analyzes exposed code.
Remove source files from public directories.
Secrets & Tokens
"api_key" | "apikey"
Leaked API keys enable unauthorized service access.
An attacker abuses exposed API keys.
Rotate keys and enforce usage restrictions.
Information Disclosure
"password"
Plaintext passwords may be exposed in files or pages.
An attacker finds leaked credentials.
Remove secrets from content and rotate credentials.
Information Disclosure
filetype:log
Logs reveal errors, paths, and sensitive operations.
An attacker analyzes logs to identify weaknesses.
Restrict log access and sanitize sensitive data.
Sensitive Configuration Files
filetype:conf | filetype:cfg | filetype:ini
Configuration files expose system internals.
An attacker reads configuration files to map infrastructure.
Secure configuration files and restrict access.
Sensitive Configuration Files
filetype:env
Environment files may contain secrets and credentials.
An attacker extracts secrets from exposed env files.
Block access and rotate exposed credentials.
Databases
ext:sql | ext:dump
Database dumps expose credentials and sensitive records.
An attacker exfiltrates database dumps.
Restrict exports and secure database backups.
Backups & Archives
ext:zip | ext:bak | ext:old | ext:tar
Backup archives may contain source code or sensitive data.
An attacker downloads and extracts backup archives.
Keep backups outside web root and restrict access.
Authentication & Access Control
intitle:"login"
Login pages reveal authentication surfaces.
An attacker targets exposed login pages for credential stuffing.
Use MFA, rate limiting, CAPTCHA, and monitoring.
Authentication & Access Control
inurl:admin
Exposed admin panels increase brute-force and credential abuse risk.
An attacker locates admin endpoints and attempts unauthorized access.
Restrict admin URLs, apply MFA, and enforce IP allowlisting.
Directories
intitle:"parent directory"
Parent directory access exposes internal file structures.
An attacker navigates directory hierarchies to locate sensitive files.
Disable directory indexing and restrict filesystem exposure.
Directories
intitle:"index of"
Open directories may expose sensitive files, backups, or internal resources.
An attacker browses open directories to download sensitive or forgotten files.
Disable directory listing and restrict access using proper server configuration.