Back to Library

Email Addresses by Domain

Extracts email addresses from a specific domain by searching PDF, Excel, and Word documents containing corporate contact information.

Beginner Friendly
Safe to use
osint

Google Dork Query:

"@example.com" filetype:pdf | filetype:xlsx | filetype:doc
0
Not verified

What It Does

This dork uses the 'filetype:/ext:' operator to filter by file format to narrow results to specific file types, the '|' operator to match alternative terms or patterns, and the '""' operator to enforce exact phrase matching. Results provide publicly available intelligence that can be aggregated for research and investigation purposes.

Common Use Cases

  • Open Source Intelligence Gathering: Collect intelligence on PDF files using publicly available information indexed by Google.
  • Digital Footprint Analysis: Analyze the digital footprint of organizations or individuals through PDF files.
  • Threat Intelligence: Feed PDF files into threat intelligence workflows to assess exposure and risk.

How to Use Safely

  1. Run this dork to gather intelligence on PDF files.
  2. Analyze the results to identify patterns, connections, or exposures of interest.
  3. Cross-reference findings with other OSINT sources to validate and enrich the data.
  4. Compile findings into an actionable intelligence report for stakeholders.

Responsible Use Required

This dork should only be used on systems you own or have explicit authorization to test. Unauthorized access to computer systems is illegal. Always follow ethical guidelines and obtain proper permission before testing.

TAGS

email
domain
documents