Professional Mode: Find vulnerabilities, exposed config files, admin panels, database backups and sensitive endpoints. Ideal for security audits and bug bounty programs.
Personal Search Mode: Locate public documents, people information, multimedia files, contact data and specific content on the web. Perfect for personal research and basic OSINT.
SELECT MODE
Choose between Cyber_Intel (pro) or File_Hunter (public)
DEFINE TARGET
Enter domain (sec) or name/topic (media)
CHOOSE DORK
Select category and pick specific dork from list
EXECUTE SCAN
Launch search on Google automatically
SEARCH CONFIGURATION
SPONSORED_INTELLIGENCE
AVAILABLE CATEGORIES
ADVANCED CONSTRUCTOR
Create custom queries combining advanced Google operators
Advanced query examples:
DOCUMENTATION & TECHNICAL GUIDE
What is Google Dorking?
Google Dorking (or Google Hacking) is an advanced OSINT technique that uses special search operators to find specific information indexed by Google. It's fundamental in:
- Pentesting and security audits
- Bug Bounty programs
- OSINT research
- Passive reconnaissance (footprinting)
Critical Operators
site:
Limit search to specific domain
filetype:
Search specific extensions (pdf, xls, etc)
inurl:
Search string in URL
intitle:
Search in page title
intext:
Search in body content
cache:
View Google cached version
Ethical & Legal Use
IMPORTANT: Using Google Dorks is completely legal as it only uses publicly indexed information. However:
- Only use this tool on authorized systems
- Don't access systems without explicit permission
- Don't exploit found vulnerabilities without authorization
- Respect responsible disclosure policies
Professional Use Cases
- Bug Bounty: Identify exposed endpoints and files
- Red Team: Passive infrastructure reconnaissance
- Blue Team: Audit your own information exposure
- OSINT: Gather open source intelligence
- Research: Find public documents and data