Skip to main content

Posts

Showing posts with the label GOOGLE DORKS

RootKit Dorks*

*RootKit Dorks* inurl:.org/*.asp inurl:.us/*.asp inurl:. gov.com/*.asp inurl:. gov.il/*.asp inurl:. co.il/*.asp inurl:. ah.cn/*.asp inurl:. bj.cn/*.asp inurl:. cq.cn/*.asp inurl:. fj.cn/*.asp inurl:. gd.cn/*.asp inurl:. gs.cn/*.asp inurl:. gz.cn/*.asp inurl:. gx.cn/*.asp inurl:. ha.cn/*.asp inurl:. hb.cn/*.asp inurl:. he.cn/*.asp inurl:. hi.cn/*.asp inurl:. hl.cn/*.asp inurl:. hn.cn/*.asp inurl:. jl.cn/*.asp inurl:. js.cn/*.asp inurl:. jx.cn/*.asp inurl:. ln.cn/*.asp inurl:. nm.cn/*.asp inurl:. nx.cn/*.asp inurl:. qh.cn/*.asp inurl:. sc.cn/*.asp inurl:. sd.cn/*.asp inurl:. sh.cn/*.asp inurl:. sn.cn/*.asp inurl:. sx.cn/*.asp inurl:. tj.cn/*.asp inurl:. tw.cn/*.asp inurl:. xj.cn/*.asp inurl:. xz.cn/*.asp inurl:. yn.cn/*.asp inurl:. zj.cn/*.asp inurl:. ac.cn/*.asp inurl:. com.cn/*.asp inurl:. edu.cn/*.asp inurl:. gov.cn/*.asp inurl:. net.cn/*.asp inurl:. org.cn/*.asp   

Bug bounty forum

Streaak: Bug bounty forum https://bugbountyforum.com/blog/ama/nahamsec / https://bugbountyforum.com/blog/ama/yaworsk / https://bugbountyforum.com/blog/ama/jstnkndy / https://bugbountyforum.com/blog/ama/itsecurityguard / https://bugbountyforum.com/blog/ama/avlidienbrunn / @irPentesters

Some really Usefull Google drive link

Anon Av: *Useful links send to all group* *useful google drive links* Google drive movies - https://drive.google.com/drive/u/0/mobile/folders/0B6FjKMQKynZILTlwZHl4ajUwcFU *Programming language collection on google drive* - https://drive.google.com/drive/folders/0ByWO0aO1eI_MN1BEd3VNRUZENkU *Books*- https://drive.google.com/drive/folders/0B0hgUX3me1_RNi1KTXBzXzdXSzA *Google drive hacking ebook collection* - https://drive.google.com/drive/folders/0B-JzQsKoJaANbTFGN0RWLWhONms *Books for reading* - https://drive.google.com/drive/folders/0B09qtt10aqV1SGxRVXBWYmNIS2M *Books (novels)* - https://drive.google.com/drive/folders/0B1v9Iy1jH3FXdlNDeUNHNEVsZlE *Books* - https://drive.google.com/drive/folders/0B1Ef5shqGHDNRGEwd3BYb0N3Um8 *C programming tutorial* google drive - https://drive.google.com/drive/folders/0B1qoi1IlEKwaM2tSMFBmOGUyNzg *Udemy course google drive link* - https://drive.google.com/drive/folders/0B1HQDi7EkA9XNlR3STF5SVJIVUk *Programming books google drive* - ht

Courses Of Hacking By penetester Academy

Noob Guy ®: [pentester academy] all courses download --------------------------------------- Web Application Pentesting link course :- www.pentesteracademy.com/course?id=5 download torrent (4.92 GB ) : http://rutracker.net/forum/viewtopic.php?t=5143366 ----------------------------------------- Javascript for Pentesters link course :- www.pentesteracademy.com/course?id=11 download torrent (1.32 GB ) : http://rutracker.net/forum/viewtopic.php?t=5149570 or 1- http://dl.git.ir/1394/7-07/Pentester%20Academy%20Javascript%20for%20Pentesters_git.ir.part1.rar 2- http://dl.git.ir/1394/7-07/Pentester%20Academy%20Javascript%20for%20Pentesters_git.ir.part2.rar code : 9997 ----------------------------------------- Web Application Pentesting + Javascript for Pentesters in one link http://adf.ly/1j79xh ----------------------------------------- WAP Challenges Course Videos course link : http://www.pentesteracademy.com/course?id=8 download :- http://dl.git.ir/1394/7-07/Pentester%20A

HACKING BY GOOGLE (LATEST DORKS)

Search webHacking Google ExposedGoogle is a treasure trove full of important information, especially for the underground world. This Potential fact can also be utilized in the data for the username and password stored on a server.If the administrator save important data not in thecomplete system authentifikasi folder, then most likely be reached by the google search engine. If data is successfully steal in by the unauthorized person, then the will be in misuse.Here, some google search syntax to crawl the password:1."Login: *" "password =*" filetype: xls(searching data command to the system files that are stored in Microsoft Excel)2.allinurl: auth_user_file.txt(to find files auth_user_file.txt containing password on server).3.filetype: xls inurl: "password.xls"(looking for username and password in ms excel format). This command can change with admin.xls)4.intitle: login password(get link to the login page with the login words on the title a

Google Dorks To Upload Shell In WordPress Sites

Google Dorks To Upload Shell In WordPress Sites “inurl:/wp-content/plugins/easy-comment-uploads/upload-form.php” /wp-content/plugins/easy-comment-uploads/upload-form.php Index of /wp-content/plugins/easy-comment-uploads

Google Dorks To Gather Sensitive Information (Data)

Google Dorks To Gather Sensitive Information (Data) filetype:bak createobject sa filetype:bak inurl:”htaccess|passwd|shadow|htusers” filetype:cfg “mrtg”target filetype:cfm “cfapplication name” password filetype:conf oekakibbs filetype:conf slapd.conf filetype:config intext:appSettings “User ID” filetype:dat “password.dat” filetype:dat inurl:Sites.dat filetype:dat wand.dat filetype:inc dbconn filetype:inc intext:mysql_connect filetype:inc mysql_connect OR mysql_pconnect filetype:inf sysprep filetype:ini inurl:”serv-u.ini” filetype:ini inurl:flashFXP.ini filetype:ini ServUDaemon filetype:ini wcx_ftp filetype:ini ws_ftp pwd filetype:ldb admin filetype:log See ipsec –copyright filetype:log inurl:”password.log” filetype:mdb inurl:users.mdb filetype:mdb wwforum filetype:netrc password filetype:pass pass intext:userid filetype:pem intext:private filetype:properties inurl:db intext:password filetype:pwd service filetype:reg reg +intext:”defaultusername” +int

Google Dorks To Find Web Admin Panels (Unsecured)

Google Dorks To Find Web Admin Panels (Unsecured) “inurl:admin/addmember.asp” “inurl:admin/addinfo.asp” “inurl:admin/addcat.asp” “inurl:admin/cp.asp” “inurl:admin/productshow.asp” “inurl:admin/addjob.asp” “inurl:admin/addjob.???” “inurl:admin/addpic.???” “inurl:admin/viewproduct.???” “inurl:admin/addaccount.php” “inurl:admin/manage.php” “inurl:admin/addcontact.???” “inurl:admin/viewmanager.???” “inurl:admin/addschool.???” “inurl:admin/addproject.???” “inurl:admin/addsale.???” “inurl:admin/addcompany.???” “inurl:admin/payment.???” “inurl:user/emp.???” “inurl:admin/addmovie.???” “inurl:admin/addpassword.???” “inurl:admin/addemployee.???” “inurl:admin/addcat.???” “inurl:admin/admin.???” “inurl:admin/admincp.???” “inurl:admin/settings.???” “inurl:admin/addstate.???” “inurl:admin/addcountry.???” “inurl:admin/addmedia.???” “inurl:admin/addcode.???” “inurl:admin/addlinks.???” “inurl:admin/addcity.???”

GOOGLE DORKS FOR SQLi

GOOGLE DORKS FOR SQLi inurl:index.php?id= inurl:trainers.php?id= inurl:buy.php?category= inurl:article.php?ID= inurl:play_old.php?id= inurl:declaration_more.php?decl_id= inurl:pageid= inurl:games.php?id= inurl:page.php?file= inurl:newsDetail.php?id= inurl:gallery.php?id= inurl:show.php?id= inurl:staff_id= inurl:newsitem.php?num= inurl:readnews.php?id= inurl:top10.php?cat= inurl:historialeer.php?num= inurl:reagir.php?num= inurl:Stray-Questions-View.php?num= inurl:forum_bds.php?num= inurl:game.php?id= inurl:view_product.php?id= inurl:newsone.php?id= inurl:sw_comment.php?id= inurl:news.php?id= inurl:avd_start.php?avd= inurl:event.php?id= inurl:product-item.php?id= inurl:sql.php?id= inurl:news_view.php?id= inurl:select_biblio.php?id= inurl:humor.php?id= inurl:aboutbook.php?id= inurl:ogl_inet.php?ogl_id= inurl:fiche_spectacle.php?id= inurl:communique_detail.php?id= inurl:sem.php3?id= inurl:kategorie.php4?id= inurl:faq2.php?id= inurl:show_an.php

GOOGLE DORKS FOR HACK ONLINE CCTV CAMERA

GOOGLE DORKS FOR HACK ONLINE CCTV CAMERA inurl:view/view.shtml inurl:/view.shtml intitle:”Live View / – AXIS” | inurl:view/view.shtml^ inurl:ViewerFrame?Mode= inurl:ViewerFrame?Mode=Refresh inurl:axis-cgi/jpg inurl:axis-cgi/mjpg (motion-JPEG) inurl:view/indexFrame.shtml inurl:view/index.shtml intitle:start inurl:cgistart intitle:”live view” intitle:axis intitle:snc-z20 inurl:home/ intitle:liveapplet intitle:”i-Catcher Console – Web Monitor” intitle:axis intitle:”video server” intitle:liveapplet inurl:LvAppl intitle:”EvoCam” inurl:”webcam.html” intitle:”Live NetSnap Cam-Server feed” intitle:”Live View / – AXIS” intitle:”Live View / – AXIS 206W” intitle:”Live View / – AXIS 210? inurl:indexFrame.shtml Axis intitle:”Live View / – AXIS 206M” inurl:”MultiCameraFrame?Mode=Motion” allintitle:”Network Camera NetworkCamera” intitle:”WJ-NT104 Main Page” intext:”MOBOTIX M1? intext:”Open Menu” intext:”MOBOTIX M10? intext:”Open Menu” intext:”MOBOTIX D10? intext

GOOGLE DORKS FOR LOCAL FILE INCLUSION VULNERABILITY

GOOGLE DORKS FOR LOCAL FILE INCLUSION VULNERABILITY inurl:/view/lang/index.php?page=?page= inurl:/shared/help.php?page= inurl:act= inurl:action= inurl:API_HOME_DIR= inurl:board= inurl:cat= inurl:client_id= inurl:cmd= inurl:cont= inurl:current_frame= inurl:date= inurl:detail= inurl:dir= inurl:display= inurl:download= inurl:f= inurl:file= inurl:fileinclude= inurl:filename= inurl:firm_id= inurl:g= inurl:getdata= inurl:go= inurl:HT= inurl:idd= inurl:inc= inurl:incfile= inurl:incl= inurl:include_file= inurl:include_path= inurl:infile= inurl:info= inurl:ir= inurl:lang= inurl:language= inurl:link= inurl:load= inurl:main= inurl:mainspot= inurl:msg= inurl:num= inurl:openfile= inurl:p= inurl:page= inurl:pagina= inurl:path= inurl:path_to_calendar= inurl:pg= inurl:qry_str= inurl:ruta= inurl:safehtml= inurl:section= inurl:showfile= inurl:side= inurl:site_id= inurl:skin= inurl:static= inurl:str= inurl:strona= inurl:sub= inurl:tresc=