Google Dorking
Google Dorking (also known as Google Hacking) is a technique we used to reveal sensitive information from search engines, particularly Google. Google have a lot of data, so we use Google Dorking to find the refined or specific results that may not be readily available.
- Common Google Dorking Techniques:
- Using specific keywords and operators(e.g., “site:”, “filetype:”, “inurl:”).
- Searching for error messages or debug information.
- Identifying outdated or vulnerable information.
Dork | Description | Example |
intext | Search for all the occurrences of the given keywords | intext: “keyword” |
inurl | Searching for the URL matching one of the keywords. | inurl: “keyword” |
intitle | Searching occurrences of keywords in title all or one. | Intitle: “keyword |
allintext | Searches of occurrences of all the keywords given. | allintext: “keyword” |
cache | Shows the version of the web page that google stores its cache | cache: “www.netrinix.com” |
site | Specifically search that particular site. | Site: “www.netrinix.com” |
filetype | Searched for particular file type. | Filetype: “pdf” |
Here is some examples:
- Filetype:pdf – We write filename and then pdf,so it gave us the result in only pdf.

2. Filetype:log: With the help of this we can find log files and there is possibility that we able to find some sensitive data over there.

3. Wayback Machine is used to check how our website looked before like if we have updated our website many times so we can how it looks on that date. It saves the previous snapshots of the website. We can find that from this web archive
There are more, as well, so you can try all of them yourself and explore everything related to Google Dorking. These are some Dorks that we generally use compared to other Dorks. We can also make our own custom Dorks by innovating on already existing Dorks. For more Dorks reference, you can visit the Google Hacking database.
Overall, Google Dorking is a powerful technique that can be used for both good and bad purposes. So take some steps to protect yourself from security breaches.
Note: This article is only for educational purposes.
For Google dorking cheat sheet contact us – Click Here



