Blog ยท Engineering & Security
๐Ÿ”ง Engineering & Security

Google Dorks: Advanced Search Operators for OSINT

"Google Dorking" is the practice of using advanced search operators to find specific kinds of content that ordinary searches miss. The technique is decades old, the operators are documented by Google itself, and the use cases range from helpful (finding your own exposed data) to harmful (finding other people's exposed data to misuse). This post covers the operators, the patterns, and the ethical framing.

What Google Dorks are

Google's search syntax includes a set of structured operators that filter results by specific criteria โ€” file type, site, URL pattern, title text, and more. Combining them produces queries far more precise than free-text search. A "dork" is just a creative combination of these operators that surfaces something interesting.

The operators themselves are public. Google publishes them. Bing and DuckDuckGo support most of the same syntax (with small differences). Nothing about using them is illegal โ€” they're searching content the publisher chose to expose to the internet. What you do with the findings is what matters.

Core operators

Domain and URL filters

Content filters

File type filters

Other useful operators

Combining operators

The power of dorking is in combining operators. Examples:

The same techniques an attacker uses to find exposed secrets are the techniques a defender uses to audit their own posture. The operators don't care which side you're on.

Defensive use cases

Audit your own organization

Find old, no-longer-needed content

Look for typosquatted domains

Research patterns

For journalists and researchers, dorks help surface documents that exist but weren't easily discoverable. Some patterns:

Beyond Google

Different engines index different content. Always check at least two:

Ethics

Dorking is a tool. The ethics depend on what you do with the findings:

Three rules that keep practitioners on the right side of the line:

  1. Run dorks against your own organization first. Most legitimate use cases never need to leave that boundary.
  2. If you find someone else's exposure, your default action is "report it, don't exploit it."
  3. Document everything. Investigations that are clean enough to share with a journalist, a judge, and the subject are clean enough to be defensible.

Limits & gotchas


For the broader OSINT methodology, see our OSINT introduction. For internet-device search, see Shodan.io explained. For the full set of OSINT tools, see the OSINT toolkit.

Sources & References
  1. Google โ€” Refine searches with operators
  2. Microsoft Bing โ€” Bing advanced search help
  3. Internet Archive โ€” Wayback Machine
  4. Exploit-DB โ€” Google Hacking Database (defensive reference)