intitle:"index of"
Impact & Info
Open directories may expose sensitive files, backups, or internal resources.
intitle:"parent directory"
Impact & Info
Parent directory access exposes internal file structures.
inurl:admin
Impact & Info
Exposed admin panels increase brute-force and credential abuse risk.
intitle:"login"
Impact & Info
Login pages reveal authentication surfaces.
ext:zip | ext:bak | ext:old | ext:tar
Impact & Info
Backup archives may contain source code or sensitive data.
ext:sql | ext:dump
Impact & Info
Database dumps expose credentials and sensitive records.
filetype:env
Impact & Info
Environment files may contain secrets and credentials.
filetype:conf | filetype:cfg | filetype:ini
Impact & Info
Configuration files expose system internals.
filetype:log
Impact & Info
Logs reveal errors, paths, and sensitive operations.
"password"
Impact & Info
Plaintext passwords may be exposed in files or pages.
"api_key" | "apikey"
Impact & Info
Leaked API keys enable unauthorized service access.
filetype:php | filetype:js
Impact & Info
Source code reveals business logic and vulnerabilities.
inurl:/debug intitle:"Debug"
Impact & Info
Debug pages expose stack traces and internals.
inurl:staging | inurl:test
Impact & Info
Staging environments often lack proper security.
filetype:txt robots
Impact & Info
Robots.txt may reveal sensitive paths.
filetype:pdf | filetype:docx | filetype:xlsx
Impact & Info
Documents may contain sensitive internal data.
inurl:phpmyadmin
Impact & Info
Database management panels allow direct DB access.
intitle:"Dashboard [Jenkins]"
Impact & Info
Jenkins exposure allows CI/CD compromise.
intitle:"Kibana"
Impact & Info
Kibana may expose logs and sensitive data.
intitle:"Grafana"
Impact & Info
Grafana exposure reveals metrics and systems.
inurl:swagger | inurl:api-docs | inurl:openapi
Impact & Info
Public API documentation may expose endpoints, parameters, and internal logic.
filetype:yml | filetype:yaml "aws"
Impact & Info
Cloud configuration files may contain infrastructure details or credentials.
"username" "password" filetype:js
Impact & Info
Hardcoded credentials enable direct system compromise.
filetype:yml ".gitlab-ci" | filetype:yaml "pipeline"
Impact & Info
CI/CD configs reveal build steps, secrets usage, and deployment logic.
inurl:metrics | inurl:prometheus
Impact & Info
Monitoring endpoints may expose system metrics and internal architecture.
intitle:"Kubernetes Dashboard"
Impact & Info
Kubernetes dashboards allow full cluster visibility and control.
filetype:gitignore
Impact & Info
.gitignore files reveal ignored files and project structure.
filetype:ovpn
Impact & Info
VPN configuration files may enable unauthorized network access.
"SMTP_PASSWORD" | "MAIL_PASSWORD"
Impact & Info
Email credentials can be abused for phishing or spam campaigns.
intitle:"index of" backup
Impact & Info
Backup directories often contain full copies of sensitive systems.
site:ahmia.fi ".gov" "db_dump" OR "internal_only"
Impact & Info
Exposed government databases can compromise national security and citizen PII.
site:ahmia.fi "ransomware" "leaked data" OR "victim list"
Impact & Info
Victim data on "Wall of Shame" sites can lead to double extortion and brand ruin.
site:ahmia.fi "LockBit" "published data" OR "exfiltrated"
Impact & Info
LockBit is a major threat actor; their leaks contain highly sensitive corporate secrets.
site:ahmia.fi "Aadhar" OR "SSN" OR "Passport" OR "National ID"
Impact & Info
Leaked national IDs enable massive financial fraud and identity theft.
site:ahmia.fi "email:password" OR "combo_list" "leaked"
Impact & Info
Compilation of Many Breaches (COMB) data enables automated credential stuffing attacks.
site:ahmia.fi "database_dump" OR "sql_dump" ext:sql
Impact & Info
Direct SQL dumps provide the entire structure and content of a compromised database.
site:ahmia.fi "index of" ".env" OR ".config" OR ".yml"
Impact & Info
Environment files often contain hardcoded API keys and database root credentials.
site:ahmia.fi "cc_fullz" OR "carding" OR "cvv" 2025..2026
Impact & Info
Fullz data includes card numbers, CVV, and owner info for immediate financial theft.
site:ahmia.fi "index of" ".git/config" OR ".ssh"
Impact & Info
Exposed .git folders allow attackers to reconstruct the entire source code and history.
site:ahmia.fi "confidential" OR "internal use only" ext:pdf
Impact & Info
Confidential documents may contain strategic plans, mergers, or employee data.
site:competitor.com -intitle:"keyword"
Impact & Info
Identify topics a competitor has NOT covered yet.
filetype:pdf "course" "marketing" OR "strategy" "internal use"
Impact & Info
Access high-value internal training materials accidentally left public.
inurl:"write-for-us" OR "guest-post" "digital marketing"
Impact & Info
Quickly find high-authority sites accepting guest contributions.
allintext:"unique phrase from your blog"
Impact & Info
Find websites that are scraping or stealing your original content.
filetype:pdf "case study" "results" -inurl:blog
Impact & Info
Discover detailed performance data that isn't linked in public blogs.
site:reddit.com intitle:"how to" "marketing" after:2025-10-01
Impact & Info
Find the exact pain points users are discussing right now.
intitle:"index of" "wp-content/uploads" "2024"
Impact & Info
Identify abandoned sites or niche assets for potential acquisition.
site:drive.google.com "marketing templates" OR "content calendar"
Impact & Info
Find publicly shared professional templates and planning tools.