Quick Tip: Combining Operators
The real power of Google dorks comes from combining multiple operators. For example:
site:example.com filetype:pdf intext:confidentialBasic Operators
Essential operators for everyday searches
site:Limit results to a specific website or domain
site:github.comfiletype:Search for specific file types
filetype:pdfinurl:Find pages with specific text in the URL
inurl:adminintitle:Find pages with specific text in the title
intitle:"Index of"intext:Find pages containing specific text in the body
intext:passwordext:Alternative to filetype for file extensions
ext:phpAdvanced Operators
Power operators for precise targeting
cache:View Google's cached version of a page
cache:example.comrelated:Find sites similar to a specified URL
related:github.cominfo:Get information about a specific URL
info:example.comdefine:Get definitions for words or phrases
define:cybersecurityAROUND(X)Find words within X words of each other
password AROUND(3) leakedBoolean & Special Operators
Combine and refine your searches
OR / |Match either term (OR logic)
admin OR administrator"quotes"Search for exact phrase match
"index of /admin"- (minus)Exclude terms from results
admin -wordpress* (wildcard)Match any word or phrase
"admin * password"( ) groupingGroup terms for complex queries
(inurl:admin | inurl:login) site:example.comDate & Location
Filter by time and place
before:Results before a specific date
before:2023-01-01after:Results after a specific date
after:2024-01-01loc:Search in specific location/country
loc:us cybersecurityNumber Ranges
Search within numeric ranges
.. (range)Search within a number range
camera $50..$100Common Dork Recipes
Ready-to-use dork combinations for common tasks
intitle:"Index of /" "parent directory"Locate servers with directory listing enabled
inurl:login | inurl:signin | inurl:adminDiscover authentication endpoints
ext:config | ext:cfg | ext:ini intext:passwordLocate exposed configuration files
ext:sql intext:"INSERT INTO" | intext:"CREATE TABLE"Discover database backup files
intitle:"index of" ".env" | "DB_PASSWORD"Locate exposed .env files with secrets
inurl:".git" intitle:"Index of"Find exposed .git directories