Wednesday 19 | 12:53:PM
Here's a bunch of links to Google Dorking methods/advice
https://nesenix.cz/index.php/articles/47-...-and-hacks
https://gist.github.com/clarketm/9194578...c217623054
https://elmerwallin.typepad.com/blog/201...asswd.html
https://securitytrails.com/blog/google-h...techniques
https://exposingtheinvisible.org/guides/google-dorking/
https://www.ma-no.org/en/security/google...-of-google
https://github.com/pikpikcu/Pentest-Tool...r/dork.txt
https://www.exploit-db.com/google-hacking-database -- ty @allclear
Other random source/help:
https://keywordsheeter.com/ -- helps to compute like-terms that could be used for dorking (Such as putting in "crypto" in the input will output things related to crypto)
Feel free to add more links below, and I can add them to this as a master list of sorts
https://nesenix.cz/index.php/articles/47-...-and-hacks
https://gist.github.com/clarketm/9194578...c217623054
https://elmerwallin.typepad.com/blog/201...asswd.html
https://securitytrails.com/blog/google-h...techniques
https://exposingtheinvisible.org/guides/google-dorking/
https://www.ma-no.org/en/security/google...-of-google
https://github.com/pikpikcu/Pentest-Tool...r/dork.txt
https://www.exploit-db.com/google-hacking-database -- ty @allclear
Other random source/help:
https://keywordsheeter.com/ -- helps to compute like-terms that could be used for dorking (Such as putting in "crypto" in the input will output things related to crypto)
Feel free to add more links below, and I can add them to this as a master list of sorts