Google Dorks for Bug Bounty | Find Sensitive Information
Google Dorks for Bug Bounty | Find Sensitive Information 1. Discovering Exposed Files: - intitle:"index of" "site: http://site.com " - filetype:log inurl:log site: http://site.com - filetype:sql inurl:sql site: http://site.com - filetype:env inurl:.env site: http://site.com 2. Finding Sensitive Directories: - inurl:/phpinfo.php site: http://site.com - inurl:/admin site: http://site.com - inurl:/backup site: http://site.com - inurl:wp- site: http://site.com 3. Exposed Configuration Files: - filetype:config inurl:config site: http://site.com - filetype:ini inurl:wp-config.php site: http://site.com - filetype:json inurl:credentials site: http://site.com 4. Discovering Usernames and Passwords: - intext:"password" filetype:log site: http://site.com - intext:"username" filetype:log site: http://site.com - filetype:sql "password" site: http://site.com 5. Finding Database Files: - filetype:sql inurl:db site: http://site.com - filetype:sql inur...