Google is one of the most popular search engine offers many different features in different languages.
The term “Google Dork” was invented by Johnny Long. As we know, search engines are designed for efficiently finding information on Internet. Usually, users simply input search terms (keywords) and search engines will return relevant websites that contain corresponding information. However, search engines also support some special operators for relatively complex searching, such as inurl, intitle, and intext. Search queries with these special operators are called Google Dorks.
With the help of Google Dorks, users can easily and quickly find more accurate search results but it has also been abused by many attackers.
Here we’ve also listed out some useful Google Dorks to search for companies that have a responsible disclosure program or bug bounty programs.
S.No. | Operators | Description | Example |
---|---|---|---|
01 | intitle: | Search Page Titles | intitle:admin login |
02 | allintitle: | Search Page Title | allintitle:admin login |
03 | inurl: | Search URL | inurl:8080/login |
04 | allinurl: | Search URL | allinurl:adminlogin |
05 | filetype: | Specific Files | filetype:json |
06 | intext: | Search text of page only | intext: admin credentials |
07 | allintext: | Search text of page only | allintext: “security tools” |
08 | site: | Search specific site | site:example.com |
09 | link: | Search for links to pages | link:bing.com |
10 | inanchor: | Search link anchor text | inanchor:”guest user” |
11 | cache: | Search for cached version of any website | cache:www.example.com |
12 | related: | Search for similar types of websites | related:www.example.com |
- CTEM – A Strategic Approach to Mitigating Cyber Risks
- AI in Penetration Testing – Revolutionizing Security Assessments
- Protecting Your Organization from AI-Enhanced Social Engineering Attacks
- The Rise of AI-Powered Cyber Attacks in 2025
- Top 5 Penetration Testing Methodologies to Follow in 2025
- Top 10 Penetration Testing Tools Every Security Professional Should Know in 2025
- Emerging Trends in Vulnerability Assessment and Penetration Testing (VAPT) for 2025
- The Role of Cybersecurity in Protecting IoT Devices in 2025
- Understanding the Five Phases of Penetration Testing
- Top 20 Cybersecurity Career Options