Skip to main content

Posts

Showing posts with the label FOR

GOOGLE DORKS FOR SQLi

GOOGLE DORKS FOR SQLi inurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurl:play_old.php?id= inurl:declaration_more.php?decl_id= inurl:pageid= inurl:games.php?id= inurl:page.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id= inurl:show.php?id= inurl:staff_id= inurl:newsitem.php?num= inurl:readnews.php?id= inurl:top10.php?cat= inurl:historialeer.php?num= inurl:reagir.php?num= inurl:Stray-Questions-View.php?num= inurl:forum_bds.php?num= inurl:game.php?id= inurl:view_product.php?id= inurl:newsone.php?id= inurl:sw_comment.php?id= inurl:news.php?id= inurl:avd_start.php?avd= inurl:event.php?id= inurl:product-item.php?id= inurl:sql.php?id= inurl:news_view.php?id= inurl:select_biblio.php?id= inurl:humor.php?id= inurl:aboutbook.php?id= inurl:ogl_inet.php?ogl_id= inurl:fiche_spectacle.php?id= inurl:communique_detail.php?id= inurl:sem.php3?id= inurl:kategorie.php4?id= inurl:faq2.php?id= inurl:show_an.php

GOOGLE DORKS FOR HACK ONLINE CCTV CAMERA

GOOGLE DORKS FOR HACK ONLINE CCTV CAMERA inurl:view/view.shtml inurl:/view.shtml intitle:”Live View / – AXIS” | inurl:view/view.shtml^ inurl:ViewerFrame?Mode= inurl:ViewerFrame?Mode=Refresh inurl:axis-cgi/jpg inurl:axis-cgi/mjpg (motion-JPEG) inurl:view/indexFrame.shtml inurl:view/index.shtml intitle:start inurl:cgistart intitle:”live view” intitle:axis intitle:snc-z20 inurl:home/ intitle:liveapplet intitle:”i-Catcher Console – Web Monitor” intitle:axis intitle:”video server” intitle:liveapplet inurl:LvAppl intitle:”EvoCam” inurl:”webcam.html” intitle:”Live NetSnap Cam-Server feed” intitle:”Live View / – AXIS” intitle:”Live View / – AXIS 206W” intitle:”Live View / – AXIS 210? inurl:indexFrame.shtml Axis intitle:”Live View / – AXIS 206M” inurl:”MultiCameraFrame?Mode=Motion” allintitle:”Network Camera NetworkCamera” intitle:”WJ-NT104 Main Page” intext:”MOBOTIX M1? intext:”Open Menu” intext:”MOBOTIX M10? intext:”Open Menu” intext:”MOBOTIX D10? intext

GOOGLE DORKS FOR LOCAL FILE INCLUSION VULNERABILITY

GOOGLE DORKS FOR LOCAL FILE INCLUSION VULNERABILITY inurl:/view/lang/index.php?page=?page= inurl:/shared/help.php?page= inurl:act= inurl:action= inurl:API_HOME_DIR= inurl:board= inurl:cat= inurl:client_id= inurl:cmd= inurl:cont= inurl:current_frame= inurl:date= inurl:detail= inurl:dir= inurl:display= inurl:download= inurl:f= inurl:file= inurl:fileinclude= inurl:filename= inurl:firm_id= inurl:g= inurl:getdata= inurl:go= inurl:HT= inurl:idd= inurl:inc= inurl:incfile= inurl:incl= inurl:include_file= inurl:include_path= inurl:infile= inurl:info= inurl:ir= inurl:lang= inurl:language= inurl:link= inurl:load= inurl:main= inurl:mainspot= inurl:msg= inurl:num= inurl:openfile= inurl:p= inurl:page= inurl:pagina= inurl:path= inurl:path_to_calendar= inurl:pg= inurl:qry_str= inurl:ruta= inurl:safehtml= inurl:section= inurl:showfile= inurl:side= inurl:site_id= inurl:skin= inurl:static= inurl:str= inurl:strona= inurl:sub= inurl:tresc=