Google Dorks, a brief list of resources

Google hacking for fun and profit

In 2002, Johnny Long began to collect interesting Google search queries that uncovers vulnerable systems or sensitive information, and calls them “Google dorks”.

We identify with “Google Dorking” the method for finding vulnerable targets using the google dorks in order to obtain usernames and passwords, email lists, sensitive documents and website vulnerabilities.


Ethical hackers can use the “Google Dorking” to improve system security, but also a black hat could use this technique for illegal activities, including cyber terrorism, industrial espionage, and identity theft.

A brief list

The original Johnny Long’s website

Some dorks focused on SQLi vulnerabilities

Another list on Exploit-DB


Some articles concerning Google Hacking

Some list found on github

Some list found on github


Other resources? Suggestions are welcome!

Related posts

  1. Google and Facebook surveillance threatens human rights, Amnesty International says
  2. Light Commands: hacking voice assistants via laser beam
  3. Google, Mozilla and Apple blocks Kazakhstan root CA certificate to fight government’s web surveillance
  4. Some useful tools for finding unsecure Google Storage Buckets
  5. No, your browser “Incognito Mode” can’t stop Facebook and Google track your porn habits!