Skip to content

SecShiv/OneDorkForAll

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

53 Commits
 
 
 
 

Repository files navigation

OneDorkForAll

An insane list of all dorks collected from various sources including Google, Shodan, GitHub, and more.

It includes:

  • Bug bounty dorks (even from private programs)
  • CCTV, CMS, LFI, SQLi, XSS, and other vulnerability dorks
  • 1M+ additional dorks
  • Dark web dorks (📚 For educational purposes only!)
  • Advanced job search dorks for targeted role hunting

📚 Recommended Resources

🔐 Exposed Configuration Files

filetype:config inurl:config site:http://site.com
filetype:ini inurl:wp-config.php site:http://site.com
filetype:json inurl:credentials site:http://site.com

🧠 Discovering Exposed Files
intitle:"index of" site:http://site.com
filetype:log inurl:log site:http://site.com
filetype:sql inurl:sql site:http://site.com
filetype:env inurl:.env site:http://site.com

🗂️ Sensitive Directories
inurl:/phpinfo.php site:http://site.com

🔐 Usernames and Passwords
intext:"password" filetype:log site:http://site.com
intext:"username" filetype:log site:http://site.com
filetype:sql "password" site:http://site.com

🧩 Database Files
filetype:sql inurl:db site:http://site.com
filetype:sql inurl:dump site:http://site.com
filetype:bak inurl:db site:http://site.com

🧬 Exposed Git Repositories
inurl:".git" site:http://site.com
inurl:"/.git/config" site:http://site.com
intitle:"index of" ".git" site:http://site.com

📧 Publicly Exposed Emails
intext:"email" site:http://site.com
inurl:"contact" intext:"@site.com" -www.site.com
filetype:xls inurl:"email" site:http://site.com

🧱 Vulnerable Web Servers
intitle:"Apache2 Ubuntu Default Page: It works" site:http://site.com
intitle:"Index of /" "Apache Server" site:http://site.com
intitle:"Welcome to nginx" site:http://site.com

🔑 API Key Disclosures
filetype:env "DB_PASSWORD" site:http://site.com
intext:"api_key" filetype:env site:http://site.com
intext:"AWS_ACCESS_KEY_ID" filetype:env site:http://site.com

💾 Backup Files
filetype:bak inurl:backup site:http://site.com
filetype:zip inurl:backup site:http://site.com
filetype:tgz inurl:backup site:http://site.com

🔓 Common Vulnerable Paths
inurl:/admin site:http://site.com
inurl:/backup site:http://site.com
inurl:wp- site:http://site.com




NOTE: This project is for educational and research purposes only.
Misuse of any information is strictly discouraged.
You are responsible for your actions.


An insane list of all dorks taken from everywhere from various different sources. Google, Shodan, Github.
Bug bounty dorks (includes private programs), shodan, github, CCTV, CMS dorks, lfi, sqli, xss, more vulns + an extra 1Mil+ dorks.
Now also added dark-web dorks (Educational Only!) (Hope this helps:)

Use these tools and resources too 👍
- https://www.exploit-db.com/google-hacking-database
- https://elite-google-dorks-search-by-biscuit.vercel.app
- http://dorkking.blindf.com
- https://dorksearch.com
- https://pentestingdorks.netlify.app
- https://dorkme.com
- https://dorkgenius.com
- https://dorks.faisalahmed.me
- https://taksec.github.io/google-dorks-bug-bounty
- https://pentest-tools.com/information-gathering/google-hacking
- https://nitinyadav00.github.io/Bug-Bounty-Search-Engine
- https://mr-dorker.onrender.com
- https://dorki.attaxa.com
- https://github.com/Viralmaniar/BigBountyRecon (Application - only for Windows install)
- https://x.com/ott3rly/status/1805173582101627035 (Article)

# Use
I will not be responsible for any misuse of these dorks. They are just to increase knowledge and awareness. Thanks for understanding.

Releases

No releases published

Packages

No packages published

Contributors 5