31 dorks available • Updated 2026
AWS S3 buckets are one of the most common sources of data breaches due to misconfigurations. Our collection of S3-specific Google dorks helps security researchers and bug bounty hunters identify exposed buckets, leaked credentials, backup files, and sensitive configurations. These dorks target common patterns like open bucket policies, directory listings, and accidentally public files that organizations often overlook.
Pro members get unlimited saves, export, and exclusive dorks
Upgrade to Pro for instant access to all premium dorks + unlimited saves and exports.
Create a free account to save dorks, track your history, and build custom collections.
Looking for more? Browse our complete library of Google dorks.