🔍 Dork Explorer

Search-Engine Recon for Offensive & Defensive Security

⚠️ EDUCATIONAL & AUTHORIZED USE ONLY.
Open Directory Listing high
intitle:"index of"
Impact & Info

Open directories may expose sensitive files, backups, or internal resources.

Parent Directory Listings high
intitle:"parent directory"
Impact & Info

Parent directory access exposes internal file structures.

Admin Panel Discovery high
inurl:admin
Impact & Info

Exposed admin panels increase brute-force and credential abuse risk.

Login Page Enumeration medium
intitle:"login"
Impact & Info

Login pages reveal authentication surfaces.

Backup Archives Exposure high
ext:zip | ext:bak | ext:old | ext:tar
Impact & Info

Backup archives may contain source code or sensitive data.

Database Dump Files critical
ext:sql | ext:dump
Impact & Info

Database dumps expose credentials and sensitive records.

Environment Files critical
filetype:env
Impact & Info

Environment files may contain secrets and credentials.

Configuration Files high
filetype:conf | filetype:cfg | filetype:ini
Impact & Info

Configuration files expose system internals.

Log File Disclosure medium
filetype:log
Impact & Info

Logs reveal errors, paths, and sensitive operations.

Password Disclosure critical
"password"
Impact & Info

Plaintext passwords may be exposed in files or pages.

API Key Exposure critical
"api_key" | "apikey"
Impact & Info

Leaked API keys enable unauthorized service access.

Source Code Disclosure medium
filetype:php | filetype:js
Impact & Info

Source code reveals business logic and vulnerabilities.

Debug Pages high
inurl:/debug intitle:"Debug"
Impact & Info

Debug pages expose stack traces and internals.

Staging & Test Environments high
inurl:staging | inurl:test
Impact & Info

Staging environments often lack proper security.

Robots.txt Discovery low
filetype:txt robots
Impact & Info

Robots.txt may reveal sensitive paths.

Internal Documents medium
filetype:pdf | filetype:docx | filetype:xlsx
Impact & Info

Documents may contain sensitive internal data.

phpMyAdmin Interfaces critical
inurl:phpmyadmin
Impact & Info

Database management panels allow direct DB access.

Jenkins Dashboards critical
intitle:"Dashboard [Jenkins]"
Impact & Info

Jenkins exposure allows CI/CD compromise.

Kibana Dashboards high
intitle:"Kibana"
Impact & Info

Kibana may expose logs and sensitive data.

Grafana Dashboards high
intitle:"Grafana"
Impact & Info

Grafana exposure reveals metrics and systems.

Exposed API Documentation medium
inurl:swagger | inurl:api-docs | inurl:openapi
Impact & Info

Public API documentation may expose endpoints, parameters, and internal logic.

Exposed Cloud Configuration Files high
filetype:yml | filetype:yaml "aws"
Impact & Info

Cloud configuration files may contain infrastructure details or credentials.

Hardcoded Credentials in Code critical
"username" "password" filetype:js
Impact & Info

Hardcoded credentials enable direct system compromise.

Exposed CI/CD Configuration Files high
filetype:yml ".gitlab-ci" | filetype:yaml "pipeline"
Impact & Info

CI/CD configs reveal build steps, secrets usage, and deployment logic.

Exposed Monitoring Endpoints medium
inurl:metrics | inurl:prometheus
Impact & Info

Monitoring endpoints may expose system metrics and internal architecture.

Exposed Kubernetes Dashboards critical
intitle:"Kubernetes Dashboard"
Impact & Info

Kubernetes dashboards allow full cluster visibility and control.

Exposed .gitignore Files low
filetype:gitignore
Impact & Info

.gitignore files reveal ignored files and project structure.

Exposed VPN Configuration Files high
filetype:ovpn
Impact & Info

VPN configuration files may enable unauthorized network access.

Exposed Email Configuration critical
"SMTP_PASSWORD" | "MAIL_PASSWORD"
Impact & Info

Email credentials can be abused for phishing or spam campaigns.

Exposed Backup Directories high
intitle:"index of" backup
Impact & Info

Backup directories often contain full copies of sensitive systems.

Government Data Leaks (.gov) critical
site:ahmia.fi ".gov" "db_dump" OR "internal_only"
Impact & Info

Exposed government databases can compromise national security and citizen PII.

Ransomware Victim Dumps critical
site:ahmia.fi "ransomware" "leaked data" OR "victim list"
Impact & Info

Victim data on "Wall of Shame" sites can lead to double extortion and brand ruin.

LockBit Leak Site Mirror critical
site:ahmia.fi "LockBit" "published data" OR "exfiltrated"
Impact & Info

LockBit is a major threat actor; their leaks contain highly sensitive corporate secrets.

Citizen Identity Leaks (PII) critical
site:ahmia.fi "Aadhar" OR "SSN" OR "Passport" OR "National ID"
Impact & Info

Leaked national IDs enable massive financial fraud and identity theft.

Massive Email/Pass COMB Search high
site:ahmia.fi "email:password" OR "combo_list" "leaked"
Impact & Info

Compilation of Many Breaches (COMB) data enables automated credential stuffing attacks.

Leaked Database SQL Dumps critical
site:ahmia.fi "database_dump" OR "sql_dump" ext:sql
Impact & Info

Direct SQL dumps provide the entire structure and content of a compromised database.

Exposed .env Config Files critical
site:ahmia.fi "index of" ".env" OR ".config" OR ".yml"
Impact & Info

Environment files often contain hardcoded API keys and database root credentials.

Credit Card Fullz Lists critical
site:ahmia.fi "cc_fullz" OR "carding" OR "cvv" 2025..2026
Impact & Info

Fullz data includes card numbers, CVV, and owner info for immediate financial theft.

Exposed Git Repositories high
site:ahmia.fi "index of" ".git/config" OR ".ssh"
Impact & Info

Exposed .git folders allow attackers to reconstruct the entire source code and history.

Corporate Confidential PDFs medium
site:ahmia.fi "confidential" OR "internal use only" ext:pdf
Impact & Info

Confidential documents may contain strategic plans, mergers, or employee data.

Competitor Content Gap Analysis low
site:competitor.com -intitle:"keyword"
Impact & Info

Identify topics a competitor has NOT covered yet.

Leaked Marketing Course PDFs medium
filetype:pdf "course" "marketing" OR "strategy" "internal use"
Impact & Info

Access high-value internal training materials accidentally left public.

Backlink Opportunity Finder low
inurl:"write-for-us" OR "guest-post" "digital marketing"
Impact & Info

Quickly find high-authority sites accepting guest contributions.

Plagiarism & Content Theft Detector low
allintext:"unique phrase from your blog"
Impact & Info

Find websites that are scraping or stealing your original content.

Unindexed Case Studies medium
filetype:pdf "case study" "results" -inurl:blog
Impact & Info

Discover detailed performance data that isn't linked in public blogs.

Trending Social Media Discussions low
site:reddit.com intitle:"how to" "marketing" after:2025-10-01
Impact & Info

Find the exact pain points users are discussing right now.

Expired Domain & Niche Research medium
intitle:"index of" "wp-content/uploads" "2024"
Impact & Info

Identify abandoned sites or niche assets for potential acquisition.

Public Google Drive Resources medium
site:drive.google.com "marketing templates" OR "content calendar"
Impact & Info

Find publicly shared professional templates and planning tools.