Google Dorks

a white board with writing on it

Google Dorks – Complete & Accurate Guide

Google Dorking (also known as Google hacking) is an advanced search technique that uses specialized operators to uncover information that isn’t easily accessible through standard Google searches. Whether you’re an SEO professional, security researcher, digital marketer, or OSINT investigator, mastering Google Dorks can dramatically improve your ability to find exactly what you’re looking for.

This comprehensive guide covers all functional Google search operators as of 2025, removing outdated commands and focusing only on techniques that actually work. From basic search operators like quotes and minus signs to advanced combinations for competitive analysis and security testing, you’ll learn how to leverage Google’s search capabilities to their fullest potential.

What you’ll discover in this guide: Essential search operators for precision results, proven SEO research techniques to analyze your competitors and improve rankings, OSINT methods for gathering intelligence from public sources, security testing dorks for authorized vulnerability assessments, and advanced query combinations that save hours of manual searching. Each operator includes clear descriptions, practical examples, and real-world use cases to help you get results immediately.

Core Search Operators

” ” (Quotes)
Description: Searches for an exact phrase match.
Example: “climate change impacts”
– (Minus)
Description: Excludes results containing the specified term.
Example: python -snake
OR
Description: Returns results containing either term (must be capitalized).
Example: SEO OR “search engine optimization”
* (Wildcard)
Description: Acts as a placeholder for any word or phrase.
Example: “best * for beginners”
( ) (Grouping)
Description: Groups terms and controls search logic.
Example: (SEO OR SEM) marketing tips

Site & Domain Operators

site:
Description: Limits results to a specific domain or site.
Example: site:reddit.com artificial intelligence
related:
Description: Finds sites similar to the specified URL.
Example: related:nytimes.com
info:
Description: Shows information Google has about a specific page.
Example: info:github.com
cache:
Description: Shows Google’s cached version of a page.
Example: cache:example.com

URL Operators

inurl:
Description: Searches for a keyword within the URL.
Example: inurl:admin login
allinurl:
Description: All search terms must appear in the URL.
Example: allinurl:admin panel php

Title Operators

intitle:
Description: Searches for a keyword in the page title.
Example: intitle:”index of” passwords
allintitle:
Description: All search terms must appear in the title.
Example: allintitle:confidential report 2024

Text Content Operators

intext:
Description: Searches for a keyword within the page body text.
Example: intext:”password reset”
allintext:
Description: All search terms must appear in the body text.
Example: allintext:username password email

Anchor Text Operators

inanchor:
Description: Searches for keywords in anchor text (clickable link text).
Example: inanchor:”click here”
allinanchor:
Description: All terms must appear in anchor text.
Example: allinanchor:best vpn service

File Type Operators

filetype: or ext:
Description: Searches for specific file types.
Example: filetype:pdf cybersecurity guide
Common file types: pdf, doc, docx, xls, xlsx, ppt, pptx, txt, csv, xml, json

Numeric Range Operator

.. (Number Range)
Description: Searches within a numeric range.
Example: laptop $500..$1000

Date Operators

before: and after:
Description: Finds pages indexed before or after a specific date (YYYY-MM-DD format).
Example: cryptocurrency after:2024-01-01 before:2024-12-31
daterange:
Description: Searches within a date range using Julian dates (rarely used).
Example: daterange:2459000-2459365

Location Operator

location:
Description: Returns results relevant to a specific location.
Example: coffee shops location:brooklyn

Google Dorks for SEO

Find Indexed Pages

Purpose: Check how many pages Google has indexed for a domain.
site:example.com

Find Subdomains

Purpose: Discover subdomains of a website.
site:*.example.com

Find Specific Content

Purpose: Locate pages with specific keywords in title.
site:example.com intitle:”product reviews”

Identify Duplicate Content

Purpose: Find pages with similar content.
“exact sentence from your page” -site:yoursite.com

Find Backlink Opportunities

Purpose: Discover sites linking to competitors.
“competitor keyword” -site:competitor.com

Check for Thin Content

Purpose: Find pages with minimal text content.
site:example.com intext:”coming soon” OR intext:”under construction”

Find Orphaned Pages

Purpose: Pages indexed but not linked internally.
site:example.com -inurl:category -inurl:tag

Discover Content Gaps

Purpose: Find topics competitors cover that you don’t.
site:competitor.com intitle:”keyword” -site:yoursite.com

Google Dorks for OSINT (Open Source Intelligence)

Find Exposed Documents

Purpose: Locate publicly accessible sensitive documents.
filetype:pdf “confidential” site:example.com

Directory Listings

Purpose: Find open directory listings.
intitle:”index of” inurl:admin

Username Search

Purpose: Find profiles associated with a username.
“username123” site:linkedin.com OR site:twitter.com OR site:github.com

Email Address Search

Purpose: Find pages containing a specific email.
“john.doe@example.com”

Phone Number Search

Purpose: Find pages containing a phone number.
“555-123-4567”

Social Media Profiles

Purpose: Find social media presence.
“John Doe” (site:linkedin.com OR site:twitter.com OR site:facebook.com OR site:instagram.com)

Exposed Credentials

Purpose: Find accidentally published credentials (ethical purposes only).
site:pastebin.com “password” “email.com”

Job Postings & Org Info

Purpose: Gather intelligence on company structure.
site:linkedin.com “company name” “software engineer”

Conference Presentations

Purpose: Find presentations and talks.
filetype:ppt OR filetype:pptx “speaker name” cybersecurity

Website Enumeration & Security Testing

⚠️ Warning: Use these only on systems you own or have explicit permission to test.

Find Login Pages

Purpose: Locate authentication pages.
site:example.com inurl:login OR inurl:signin OR inurl:admin

Backup Files

Purpose: Search for backup files.
site:example.com ext:bak OR ext:backup OR ext:old OR ext:sql

Configuration Files

Purpose: Find exposed config files.
site:example.com ext:conf OR ext:config OR ext:cfg OR ext:ini

Database Files

Purpose: Locate database dumps.
site:example.com ext:sql OR ext:db OR ext:dbf OR ext:mdb

Log Files

Purpose: Find exposed log files.
site:example.com ext:log OR ext:logs

Git Repositories

Purpose: Find exposed .git directories.
site:example.com inurl:.git

Environment Files

Purpose: Locate environment configuration files.
site:example.com inurl:.env

WordPress Specific

Purpose: Find WordPress installation details.
site:example.com inurl:wp-content OR inurl:wp-includes

Admin Panels

Purpose: Locate administrative interfaces.
site:example.com (inurl:admin OR inurl:administrator OR inurl:cpanel)

Error Messages

Purpose: Find pages with error messages that may reveal info.
site:example.com “error” OR “warning” OR “fatal” intext:”line”

PHP Info Pages

Purpose: Find exposed PHP configuration pages.
site:example.com inurl:phpinfo.php

SQL Errors

Purpose: Identify potential SQL injection points.
site:example.com intext:”sql syntax” OR intext:”mysql error”

Default Credentials

Purpose: Find pages with default credentials documented.
inurl:readme intext:”default password”

Exposed API Keys

Purpose: Find accidentally published API keys.
site:github.com “api_key” OR “apikey” “example.com”

WordPress Users

Purpose: Enumerate WordPress users.
site:example.com inurl:author

Advanced Combinations

Find PDFs on Government Sites

site:.gov filetype:pdf budget 2024

Recent Security Vulnerabilities

“security vulnerability” after:2024-01-01 filetype:pdf

Find Competitor Pricing

site:competitor.com intitle:pricing OR intitle:plans

Research Papers on Specific Topic

filetype:pdf “machine learning” intext:”published” after:2023-01-01

Find Open Directories with Videos

intitle:”index of” (mkv OR avi OR mp4)

Identify Technology Stack

site:example.com intext:”powered by” OR intext:”built with”

Find Job Requirements

site:indeed.com OR site:linkedin.com “machine learning engineer” “requirements”

Locate Spreadsheets with Data

filetype:xlsx OR filetype:csv “sales data” 2024

Tips for Effective Google Dorking

  1. Combine operators for more precise results
  2. Start broad, then narrow your search
  3. Use quotes for exact phrases
  4. Be specific with file types and sites
  5. Test variations of your queries
  6. Respect privacy and legality – don’t access unauthorized systems
  7. Use responsibly for legitimate research, security testing, or SEO purposes only

Legal & Ethical Considerations

  • Only test systems you own or have explicit written permission to test
  • Accessing unauthorized systems is illegal in most jurisdictions
  • Use these techniques for legitimate purposes: SEO research, security auditing (authorized), OSINT research, academic purposes
  • Respect privacy and data protection laws
  • Report vulnerabilities responsibly through proper channels

Last Updated: October 2025