⚠️ Legal Warning

Authorization Required: Only use this tool on websites you own or have explicit written permission to test.

Legal Consequences: Unauthorized access violates the CFAA and can result in criminal charges.

Responsible Disclosure: Report any vulnerabilities through proper channels, never exploit them.

By clicking OK, you acknowledge you will use this tool legally and ethically.

Google Dork Builder

ADVANCED SEARCH QUERY & OSINT TOOL

Parameters

💡 Use commas to quote each term, OR/AND for operators

Generated Query

💡 Use "View Results" to manage findings on-site, or "Search" to open in Google/Bing

Common Payloads

Syntax Reference

site: Search within specific domain
filetype: Filter by file extension
intitle: Search in page title
inurl: Search in URL
intext: Search in page content
- Exclude term (e.g., -gov)
OR Logical OR between terms
\"\" Exact phrase match

⚠️ Ethics & Legal

Authorization: Only dork authorized targets (your own sites or with explicit permission)
Avoid Misuse: Don't access/exploit unauthorized data. Violates CFAA & laws
Responsible Disclosure: Report vulnerabilities through proper channels

🔒 Security Tips (for Owners)

robots.txt: Block sensitive dirs from indexing
Disable Directory Listing: Prevent 'index of' results
NoIndex Tags: Use meta tags on sensitive pages
Access Controls: Don't rely on obscurity alone
Regular Audits: Test your own domains periodically

What is Google Dorking?

Google Dorking, also known as Google Hacking, is an advanced search technique that uses specialized operators to refine search results. Security researchers, ethical hackers, and OSINT (Open Source Intelligence) analysts use these operators to uncover publicly available information that is difficult to find with standard queries.

Our Google Dork Builder simplifies this process by providing an interactive interface to construct complex search queries safely and efficiently. Whether you are conducting a security assessment, looking for specific file types, or researching a domain, this tool helps you harness the full power of search engines.

Google Dorking Cheat Sheet

  • site:example.com Limit results to a specific domain or website.
  • filetype:pdf Search for specific file extensions (e.g., pdf, xlsx, docx).
  • intitle:"index of" Find pages with specific words in the title.
  • inurl:admin Find pages with specific words in the URL structure.
  • intext:password Search for specific text within the body content of a page.
  • cache:url View Google's cached version of a webpage.

Common Use Cases

🛡️ Vulnerability Assessment

Security professionals use dorks to find exposed configuration files, open directories, and sensitive data leaks on their own infrastructure.

🔍 OSINT Investigations

Researchers use advanced queries to gather public intelligence, verify facts, and track digital footprints across the web.

📚 Academic Research

Students and academics can filter for specific document types (like PDF reports or Excel datasets) to find high-quality sources.