Skip to main content

Overview

The Google Hacking tool uses advanced search operators (Google dorks) to discover exposed sensitive information, misconfigurations, and security issues indexed by search engines. Google Hacking is a discovery tool: it helps you find publicly indexed information but does not test for vulnerabilities. Since searches are performed directly in your browser, this tool does not add data to your Attack Surface or generate findings.
This tool uses your browser to make requests to Google. Your browser must allow popups for the search results to open.

How it works

Unlike other tools on the platform, Google Hacking doesn’t run a scan on our servers. Instead:
  1. Enter your target domain
  2. Click on a search category
  3. A new browser window opens with the Google search results
  4. Review the indexed content Google has found
This approach means you’re searching Google directly from your browser, giving you real-time results.

Parameters

ParameterDescription
TargetDomain name to search for (e.g., example.com). When you specify a domain, Google returns results for all subdomains as well.

Search categories

The tool provides pre-built search queries organized into categories:

Files and directories

CategoryWhat it finds
Publicly exposed documentsWord documents, presentations, spreadsheets, CSV files
Directory listing vulnerabilitiesOpen directory indexes (index of)
Configuration files exposedXML, CONF, INI, ENV, YML, JSON, and other config files
Database files exposedSQL dumps, MDB, DBF files
Log files exposedLog files that may contain sensitive data
Backup and old filesFiles with .bak, .old, .backup extensions

Authentication pages

CategoryWhat it finds
Login pagesAdmin panels, sign-in forms, authentication endpoints
Signup pagesRegistration forms

Errors and debug info

CategoryWhat it finds
SQL errorsDatabase error messages that may reveal structure
PHP errors / warningsPHP parse errors and warnings
phpinfo()Exposed PHP configuration pages

External sources

CategoryWhat it finds
Search Pastebin.com and pasting sitesTarget mentions on paste sites
Search Github.com and Gitlab.comTarget references in code repositories
Search Stackoverflow.comDeveloper questions mentioning the target
Search in Wayback MachineHistorical snapshots of the target

Discovery

CategoryWhat it finds
Find SubdomainsSubdomains indexed by Google
Find Sub-SubdomainsSecond-level subdomains
Show only IP addressesIP-based results (opens multiple tabs)
Run these searches regularly to detect accidentally exposed files before attackers do. New exposures often happen after deployments.

Follow-up actions

After discovering exposed information:
  1. Check external sources: Don’t just search your own site, check paste sites and code repositories where developers might have accidentally shared credentials
  2. Use Wayback Machine: Historical snapshots can reveal previously exposed content
  3. Fingerprint technologies: Use the Website Recon tool on discovered URLs
  4. Discover hidden files: Use the URL Fuzzer to find files not indexed by Google
  5. Enumerate subdomains: Use the Subdomain Finder for active subdomain enumeration