# Dorklist - Google Dork Builder & Threat Intelligence > Build powerful Google dorks for security research, OSINT, penetration testing, and bug bounty hunting. ## Overview Dorklist is a comprehensive Google Dork builder and intelligence library designed for cybersecurity professionals, security researchers, penetration testers, and bug bounty hunters. Our platform provides tools and pre-built dorks to enhance reconnaissance and information gathering operations. ## Key Features - **Interactive Dork Builder**: Visual builder for constructing complex Google dork queries with operators like site:, filetype:, intitle:, inurl:, and more - **Pre-built Dork Library**: 100+ curated dorks across multiple categories - **Individual Dork Pages**: Each dork has a dedicated SEO-optimized page at /dork/[slug] with detailed explanations, use cases, examples, and step-by-step guides - **Category System**: Organized dorks by purpose (vulnerabilities, exposed files, login pages, databases, APIs, configurations, etc.) - **Search & Filter**: Quickly find relevant dorks for your security research - **User Accounts**: Save favorite dorks, organize into collections, and track search history - **Submit Dorks**: Community-driven submissions for expanding the library - **Pro Features**: Unlimited saves, custom collections, export/import functionality, and access to premium dorks ## Categories 1. **Vulnerabilities**: Find sites with known security vulnerabilities 2. **Exposed Files**: Discover publicly accessible sensitive files (PDFs, Excel, SQL dumps, config files) 3. **Login Pages**: Locate admin panels, authentication portals, and login interfaces 4. **Databases**: Find exposed database files and interfaces 5. **API Endpoints**: Discover public and misconfigured API endpoints 6. **Configurations**: Locate configuration files and environment files ## Use Cases ### Security Research Use Dorklist to identify security misconfigurations, exposed sensitive data, and potential vulnerabilities across web applications. ### OSINT (Open Source Intelligence) Gather intelligence on targets using advanced Google search operators for reconnaissance and information gathering. ### Bug Bounty Hunting Find potential security vulnerabilities in bug bounty programs by discovering exposed endpoints, files, and misconfigurations. ### Penetration Testing Enhance penetration testing engagements with targeted reconnaissance using Google dorks to identify attack surfaces. ### Vulnerability Scanning Identify exposed sensitive information, backup files, configuration files, and other security risks. ## How It Works 1. **Build Dorks**: Use our interactive builder to combine search operators (site, filetype, intitle, inurl, intext, ext, cache) 2. **Browse Library**: Explore pre-built dorks organized by category 3. **Execute Searches**: Click any dork to run it directly on Google 4. **Save Favorites**: Create an account to save dorks for later use 5. **Submit New Dorks**: Contribute to the community by submitting new dorks ## Popular Dorks - `site:example.com filetype:pdf` - Find PDF files on a specific domain - `intitle:"index of" "backup"` - Find exposed backup directories - `inurl:admin login` - Locate admin login pages - `filetype:sql "password"` - Find SQL files containing passwords - `site:example.com ext:env` - Find exposed environment files - `intitle:"phpMyAdmin" inurl:index.php` - Find phpMyAdmin installations ## Technical Details - **Stack**: Next.js 13, React, TypeScript, Tailwind CSS - **Database**: Supabase (PostgreSQL) - **Authentication**: Supabase Auth (email/password) - **Deployment**: Optimized for production with SSG/ISR - **Analytics**: Google Analytics integration ## Target Audience - Security Researchers - Penetration Testers - Bug Bounty Hunters - Cybersecurity Professionals - Ethical Hackers - OSINT Analysts - Information Security Teams - SOC Analysts - Threat Intelligence Researchers ## Best Practices 1. **Always get authorization** before testing on systems you don't own 2. **Use responsibly** - Google dorking should only be used for ethical security research 3. **Follow bug bounty rules** - Respect program scope and rules of engagement 4. **Report vulnerabilities** - Responsibly disclose any findings to affected organizations 5. **Stay legal** - Only test systems you have explicit permission to test ## Keywords google dorks, dorking, dork builder, security research, OSINT, open source intelligence, bug bounty, penetration testing, ethical hacking, cybersecurity, threat intelligence, vulnerability scanning, information gathering, reconnaissance, infosec, google hacking, search operators, google hacking database, GHDB, security tools, recon tools ## Contact For inquiries, submissions, or support, visit our website or create an account to engage with the community. --- *Last Updated: 2026-01-11* *Version: 1.0.0*