Discover open directories on beta or testing subdomains that may contain development files or overlooked data.
site:*beta.* "index of"
inurl:login | inurl:adminlogin | intitle:"login page"
inurl:admin intitle:"admin login"
intitle:"index of" "backup"
intitle:"index of" (mp3|pdf|doc|sql|zip)
inurl:"/phpinfo.php"
filetype:env "DB_PASSWORD"
filetype:sql "INSERT INTO"
filetype:log password | email
intext:"AWS_ACCESS_KEY_ID" | "AWS_SECRET_ACCESS_KEY"
intitle:"index of" ".git"
filetype:xml site:* ext:xml
filetype:json "auth" OR "credentials"
intitle:"phpinfo()" "PHP Version"
inurl:"/server-status" "Apache Status"
intitle:"index of" site:*.gov
intitle:"index of" "parent directory"
inurl:/view.shtml
intitle:"webcamXP 5"
- Look for misconfigured Firebase DBs:
site:.firebaseio.com inurl:.json
- Public Trello boards:
site:trello.com inurl:boards
- GitHub dorks for secrets:
site:github.com "SECRET_KEY"