Ethical Hacking Google Dork Tool by Pulak Pramanik 15/06/2024 by Pulak Pramanik 0 comments 748 views 748FacebookTwitterLinkedinWhatsappTelegramCopy LinkEmail Table of Contents Google Dork ToolConfidential Documents:Corporate Communications:Sensitive Infrastructure Data:Project management sites:Sensitive Files:Financial Records:Employee Information:Directory Listing:Code share sites:Find GitLab/GitHub/Bitbucket:Sensitive Directories and Files:Devloped By: DeadArmyHow to Use: 5/5 - (1 vote) Google Dork ToolTarget Domain: Select Search Engine: GoogleBingYahooDuckDuckGoYandexBaiduConfidential Documents:🔍 confidential🔍 top secret🔍 classified🔍 client data🔍 customer details🔍 salary🔍 restricted🔍 internal use only🔍 not for public release🔍 budget approvedCorporate Communications:🔍 email🔍 board meeting🔍 proprietary information🔍 marketing strategy🔍 internal memoSensitive Infrastructure Data:🔍 network layout🔍 facility layout🔍 SCADA system🔍 server configuration🔍 seaport layoutProject management sites:🔍 project mannagmentSensitive Files:🔍 Config files🔍 Database files🔍 Backup files🔍 .git folder🔍 Exposed documents🔍 SQL errors🔍 PHP errors🔍 Other files🔍 Open redirectsFinancial Records:🔍 financial report🔍 bank statement🔍 invoice🔍 budget plan🔍 tax returnEmployee Information:🔍 employee directory🔍 resume🔍 employee contract🔍 performance review🔍 personnel file🔍 LinkedinDirectory Listing:🔍 index🔍 ftp🔍 adminCode share sites:🔍 code shareFind GitLab/GitHub/Bitbucket:🔍 GitHub🔍 GitLab🔍 Bitbucket🔍 StackoverflowSensitive Directories and Files:🔍 config🔍 password🔍 adminDevloped By: DeadArmy How to Use: google dorkgoogle dorks cheat sheet hacking Share 1 FacebookTwitterLinkedinWhatsappTelegramCopy LinkEmail Pulak Pramanik I am Security Researcher, Ethical hacker, Coder, Web Devloper Protected Seriours Data on our System & Bug Bounty hunter.. Networking Cisco CCNA, Linux etc.. & Content writer... previous post What is Dork next post Github Dork For Finding Sensitive Information You may also like Linux File System Architecture Advanced Persistent Threat Attack: Key Details & Protection... Dictionary attack definition Information Gathering Company & Employee details Blind SQL Injection Detection and Exploitation Cheat Sheet SQL injection cheat sheet Subdomain Brute Force Web Technology Detector Subdomain Enumeration Tool Footprinting in Ethical Hacking Leave a Comment Cancel Reply Your rating: